From: "Yao, Jiewen" <jiewen.yao@intel.com>
To: "devel@edk2.groups.io" <devel@edk2.groups.io>,
"Yao, Jiewen" <jiewen.yao@intel.com>,
"Hou, Wenxing" <wenxing.hou@intel.com>,
"Kinney, Michael D" <michael.d.kinney@intel.com>
Cc: Sean Brogan <sean.brogan@microsoft.com>,
Joey Vagedes <joey.vagedes@gmail.com>,
Liming Gao <gaoliming@byosoft.com.cn>,
Andrew Fish <afish@apple.com>,
"Liu, Zhiguang" <zhiguang.liu@intel.com>,
"Kumar, Rahul R" <rahul.r.kumar@intel.com>
Subject: Re: [edk2-devel] [PATCH 0/9] Add DeviceSecurity feature based on PFP 1.06 spec
Date: Tue, 16 Apr 2024 09:36:47 +0000 [thread overview]
Message-ID: <MW4PR11MB5872573187985EB3982DA2158C082@MW4PR11MB5872.namprd11.prod.outlook.com> (raw)
In-Reply-To: <17C6B87A036D5709.13290@groups.io>
Hi Wenxing
I just realized that this libspdm submodule does NOT use the latest tag.
Since DMTF release 3.3.0 for libspdm https://github.com/DMTF/libspdm/releases/tag/3.3.0, I recommend we update to the latest one.
Thank you
Yao, Jiewen
> -----Original Message-----
> From: devel@edk2.groups.io <devel@edk2.groups.io> On Behalf Of Yao, Jiewen
> Sent: Tuesday, April 16, 2024 5:26 PM
> To: Hou, Wenxing <wenxing.hou@intel.com>; Kinney, Michael D
> <michael.d.kinney@intel.com>; devel@edk2.groups.io
> Cc: Sean Brogan <sean.brogan@microsoft.com>; Joey Vagedes
> <joey.vagedes@gmail.com>; Liming Gao <gaoliming@byosoft.com.cn>; Andrew
> Fish <afish@apple.com>; Liu, Zhiguang <zhiguang.liu@intel.com>; Kumar, Rahul R
> <rahul.r.kumar@intel.com>
> Subject: Re: [edk2-devel] [PATCH 0/9] Add DeviceSecurity feature based on PFP
> 1.06 spec
>
> Reviewed-by: Jiewen Yao <Jiewen.yao@intel.com>
>
> > -----Original Message-----
> > From: Hou, Wenxing <wenxing.hou@intel.com>
> > Sent: Monday, April 15, 2024 10:08 AM
> > To: Kinney, Michael D <michael.d.kinney@intel.com>; devel@edk2.groups.io
> > Cc: Sean Brogan <sean.brogan@microsoft.com>; Joey Vagedes
> > <joey.vagedes@gmail.com>; Liming Gao <gaoliming@byosoft.com.cn>; Andrew
> > Fish <afish@apple.com>; Liu, Zhiguang <zhiguang.liu@intel.com>; Kumar, Rahul
> R
> > <rahul.r.kumar@intel.com>; Yao, Jiewen <jiewen.yao@intel.com>
> > Subject: RE: [PATCH 0/9] Add DeviceSecurity feature based on PFP 1.06 spec
> >
> > Hi Mike,
> >
> > I have submitted PATCH v3, which updated the Readme.rst for libspdm
> submodule
> > license. And I have added Leif.
> > Please review the PATCH v3.
> >
> > For your second feedback, I have investigate the situation.
> >
> > If we use 'git submodule update --init' to clone the submodule, the
> > mbedtls/openssl/cmocka in libspdm will not be cloned due to the absence of
> the
> > '--recursive' option.
> > And it will not affect the build and use of DeviceSecurity.
> >
> >
> > Thanks,
> > Wenxing
> >
> >
> > -----Original Message-----
> > From: Kinney, Michael D <michael.d.kinney@intel.com>
> > Sent: Tuesday, April 9, 2024 11:14 PM
> > To: Hou, Wenxing <wenxing.hou@intel.com>; devel@edk2.groups.io
> > Cc: Sean Brogan <sean.brogan@microsoft.com>; Joey Vagedes
> > <joey.vagedes@gmail.com>; Liming Gao <gaoliming@byosoft.com.cn>; Andrew
> > Fish <afish@apple.com>; Liu, Zhiguang <zhiguang.liu@intel.com>; Kumar, Rahul
> R
> > <rahul.r.kumar@intel.com>; Yao, Jiewen <jiewen.yao@intel.com>; Kinney,
> > Michael D <michael.d.kinney@intel.com>
> > Subject: RE: [PATCH 0/9] Add DeviceSecurity feature based on PFP 1.06 spec
> >
> > +Leif
> >
> > Adding a new submodule requires review by the stewards to review the license
> > and the health and support of the submodule project.
> >
> > The top level Readme also requires updates. It lists all the submodules and
> > licenses used. Please update this series with the Readme changes.
> >
> > https://github.com/tianocore/edk2?tab=readme-ov-file#license-details
> >
> > I also notice that libspdm has its own .gitmodules file that pulls in more
> > submodules.
> >
> > [submodule "os_stub/openssllib/openssl"]
> > path = os_stub/openssllib/openssl
> > url = https://github.com/openssl/openssl
> > [submodule "os_stub/mbedtlslib/mbedtls"]
> > path = os_stub/mbedtlslib/mbedtls
> > url = https://github.com/ARMmbed/mbedtls
> > [submodule "unit_test/cmockalib/cmocka"]
> > path = unit_test/cmockalib/cmocka
> > url = https://git.cryptomilk.org/projects/cmocka.git
> >
> >
> > edk2 already had openssl and mbedtls as submodules, does this mean that
> > openssl and mbedtls will be cloned twice in 2 different locations now?
> >
> > The edk2 project had issues with the stability of the cmocka server and changed
> > to a tianocore mirror of the cmocka submodule to improve CI stability. This is
> > another submodule that will be cloned twice and may reintroduce the potential
> > for CI stability issues.
> >
> > Thanks,
> >
> > Mike
> >
> > > -----Original Message-----
> > > From: Hou, Wenxing <wenxing.hou@intel.com>
> > > Sent: Monday, April 1, 2024 7:31 PM
> > > To: devel@edk2.groups.io
> > > Cc: Sean Brogan <sean.brogan@microsoft.com>; Joey Vagedes
> > > <joey.vagedes@gmail.com>; Kinney, Michael D
> > > <michael.d.kinney@intel.com>; Liming Gao <gaoliming@byosoft.com.cn>;
> > > Andrew Fish <afish@apple.com>; Liu, Zhiguang <zhiguang.liu@intel.com>;
> > > Kumar, Rahul R <rahul.r.kumar@intel.com>; Yao, Jiewen
> > > <jiewen.yao@intel.com>
> > > Subject: [PATCH 0/9] Add DeviceSecurity feature based on PFP 1.06 spec
> > >
> > > REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2479
> > >
> > > In PFP spec 1.06, platform firmware records the device certificate and
> > > device measurement for each SPDM responder.
> > > This PATCH set implement the DeviceSecurityLib to support spdm device
> > > Authentication and Measurement.
> > >
> > > Libspdm as submodule is to support DeviceSecurity feature:
> > > https://github.com/DMTF/libspdm
> > >
> > > TCG PFP spec 1.06:
> > > https://trustedcomputinggroup.org/resource/pc-client-specific-
> > > platform-firmware-profile-specification/
> > >
> > > The POC branch:
> > > https://github.com/tianocore/edk2-staging/tree/DeviceSecurity
> > >
> > > And the PATCH set has passed the EDKII CI:
> > > https://github.com/tianocore/edk2/pull/5508
> > >
> > > Cc: Sean Brogan <sean.brogan@microsoft.com>
> > > Cc: Joey Vagedes <joey.vagedes@gmail.com>
> > > Cc: Michael D Kinney <michael.d.kinney@intel.com>
> > > Cc: Liming Gao <gaoliming@byosoft.com.cn>
> > > Cc: Andrew Fish <afish@apple.com>
> > > Cc: Zhiguang Liu <zhiguang.liu@intel.com>
> > > Cc: Rahul Kumar <rahul1.kumar@intel.com>
> > > Cc: Jiewen Yao <jiewen.yao@intel.com>
> > > Signed-off-by: Wenxing Hou <wenxing.hou@intel.com>
> > >
> > > Wenxing Hou (9):
> > > MdePkg: Add SPDM1.2 support.
> > > MdePkg: Add TCG PFP 1.06 support.
> > > MdePkg: Add devAuthBoot GlobalVariable
> > > MdeModulePkg/Variable: Add TCG SPDM device measurement update
> > > SecurityPkg: Add TCG PFP 1.06 support.
> > > SecurityPkg: add DeviceSecurity support
> > > .pytool/CISettings.py: add libspdm submodule.
> > > .gitmodule: Add libspdm submodule for EDKII
> > > SecurityPkg: Add libspdm submodule
> > >
> > > .gitmodules | 3 +
> > > .pytool/CISettings.py | 2 +
> > > MdeModulePkg/MdeModulePkg.dec | 5 +
> > > .../Variable/RuntimeDxe/Measurement.c | 38 +-
> > > .../RuntimeDxe/VariableRuntimeDxe.inf | 3 +
> > > .../RuntimeDxe/VariableSmmRuntimeDxe.inf | 3 +
> > > MdePkg/Include/Guid/GlobalVariable.h | 8 +-
> > > MdePkg/Include/Guid/ImageAuthentication.h | 5 +-
> > > MdePkg/Include/IndustryStandard/Spdm.h | 1112
> > > ++++++++++++++++-
> > > .../IndustryStandard/UefiTcgPlatform.h | 186 ++-
> > > .../OsStub/CryptlibWrapper/CryptlibWrapper.c | 970 ++++++++++++++
> > > .../CryptlibWrapper/CryptlibWrapper.inf | 38 +
> > > .../OsStub/MemLibWrapper/MemLibWrapper.c | 177 +++
> > > .../OsStub/MemLibWrapper/MemLibWrapper.inf | 33 +
> > > .../PlatformLibWrapper/PlatformLibWrapper.c | 85 ++
> > > .../PlatformLibWrapper/PlatformLibWrapper.inf | 33 +
> > > .../SpdmLib/Include/Stub/SpdmLibStub.h | 347 +++++
> > > .../SpdmLib/Include/hal/LibspdmStdBoolAlt.h | 23 +
> > > .../SpdmLib/Include/hal/LibspdmStdDefAlt.h | 16 +
> > > .../SpdmLib/Include/hal/LibspdmStdIntAlt.h | 25 +
> > > .../DeviceSecurity/SpdmLib/Include/hal/base.h | 94 ++
> > > .../SpdmLib/Include/hal/library/debuglib.h | 39 +
> > > .../SpdmLib/Include/library/spdm_lib_config.h | 394 ++++++
> > > .../DeviceSecurity/SpdmLib/SpdmCommonLib.inf | 47 +
> > > .../DeviceSecurity/SpdmLib/SpdmCryptLib.inf | 45 +
> > > .../SpdmLib/SpdmDeviceSecretLibNull.inf | 36 +
> > > .../SpdmLib/SpdmRequesterLib.inf | 59 +
> > > .../SpdmLib/SpdmResponderLib.inf | 61 +
> > > .../SpdmLib/SpdmSecuredMessageLib.inf | 44 +
> > > .../SpdmLib/SpdmTransportMctpLib.inf | 38 +
> > > .../SpdmLib/SpdmTransportPciDoeLib.inf | 38 +
> > > SecurityPkg/DeviceSecurity/SpdmLib/libspdm | 1 +
> > > .../SpdmSecurityLib/SpdmAuthentication.c | 697 +++++++++++
> > > .../SpdmSecurityLib/SpdmConnectionInit.c | 481 +++++++
> > > .../SpdmSecurityLib/SpdmMeasurement.c | 714 +++++++++++
> > > .../SpdmSecurityLib/SpdmSecurityLib.c | 148 +++
> > > .../SpdmSecurityLib/SpdmSecurityLib.inf | 54 +
> > > .../SpdmSecurityLib/SpdmSecurityLibInternal.h | 250 ++++
> > > SecurityPkg/Include/Library/SpdmSecurityLib.h | 437 +++++++
> > > SecurityPkg/Include/Library/Tpm2CommandLib.h | 23 +-
> > > .../Include/Protocol/DeviceSecurityPolicy.h | 133 ++
> > > .../HashLibBaseCryptoRouterDxe.c | 88 +-
> > > .../Library/Tpm2CommandLib/Tpm2NVStorage.c | 122 +-
> > > SecurityPkg/SecurityPkg.ci.yaml | 17 +-
> > > SecurityPkg/SecurityPkg.dec | 13 +-
> > > SecurityPkg/SecurityPkg.dsc | 31 +-
> > > SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.c | 61 +-
> > > SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf | 4 +-
> > > 48 files changed, 7196 insertions(+), 85 deletions(-) create mode
> > > 100644
> > > SecurityPkg/DeviceSecurity/OsStub/CryptlibWrapper/CryptlibWrapper.c
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/OsStub/CryptlibWrapper/CryptlibWrapper.inf
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/OsStub/MemLibWrapper/MemLibWrapper.c
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/OsStub/MemLibWrapper/MemLibWrapper.inf
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/OsStub/PlatformLibWrapper/PlatformLibWrappe
> > > r.c
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/OsStub/PlatformLibWrapper/PlatformLibWrappe
> > > r.inf
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/SpdmLib/Include/Stub/SpdmLibStub.h
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdBoolAlt.h
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdDefAlt.h
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdIntAlt.h
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/base.h
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/library/debuglib.h
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/SpdmLib/Include/library/spdm_lib_config.h
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmCommonLib.inf
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmCryptLib.inf
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmDeviceSecretLibNull.inf
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmRequesterLib.inf
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmResponderLib.inf
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmSecuredMessageLib.inf
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmTransportMctpLib.inf
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmTransportPciDoeLib.inf
> > > create mode 160000 SecurityPkg/DeviceSecurity/SpdmLib/libspdm
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmAuthentication.c
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmConnectionInit.c
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmMeasurement.c
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLib.c
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLib.inf
> > > create mode 100644
> > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLibInternal.h
> > > create mode 100644 SecurityPkg/Include/Library/SpdmSecurityLib.h
> > > create mode 100644
> > > SecurityPkg/Include/Protocol/DeviceSecurityPolicy.h
> > >
> > > --
> > > 2.26.2.windows.1
>
>
>
>
>
-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#117872): https://edk2.groups.io/g/devel/message/117872
Mute This Topic: https://groups.io/mt/105281046/7686176
Group Owner: devel+owner@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io]
-=-=-=-=-=-=-=-=-=-=-=-
prev parent reply other threads:[~2024-04-16 9:36 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-04-02 2:31 [edk2-devel] [PATCH 0/9] Add DeviceSecurity feature based on PFP 1.06 spec Wenxing Hou
2024-04-02 2:31 ` [edk2-devel] [PATCH 1/9] MdePkg: Add SPDM1.2 support Wenxing Hou
2024-04-02 2:31 ` [edk2-devel] [PATCH 2/9] MdePkg: Add TCG PFP 1.06 support Wenxing Hou
2024-04-02 2:31 ` [edk2-devel] [PATCH 3/9] MdePkg: Add devAuthBoot GlobalVariable Wenxing Hou
2024-04-02 2:31 ` [edk2-devel] [PATCH 4/9] MdeModulePkg/Variable: Add TCG SPDM device measurement update Wenxing Hou
2024-04-04 15:57 ` Michael Kubacki
2024-04-08 1:59 ` Wenxing Hou
2024-04-02 2:31 ` [edk2-devel] [PATCH 5/9] SecurityPkg: Add TCG PFP 1.06 support Wenxing Hou
2024-04-02 2:31 ` [edk2-devel] [PATCH 6/9] SecurityPkg: add DeviceSecurity support Wenxing Hou
2024-04-02 2:31 ` [edk2-devel] [PATCH 7/9] .pytool/CISettings.py: add libspdm submodule Wenxing Hou
2024-04-03 17:32 ` Joey Vagedes via groups.io
2024-04-02 2:31 ` [edk2-devel] [PATCH 8/9] .gitmodule: Add libspdm submodule for EDKII Wenxing Hou
2024-04-02 2:31 ` [edk2-devel] [PATCH 9/9] SecurityPkg: Add libspdm submodule Wenxing Hou
2024-04-09 15:13 ` [edk2-devel] [PATCH 0/9] Add DeviceSecurity feature based on PFP 1.06 spec Michael D Kinney
2024-04-15 2:08 ` Wenxing Hou
2024-04-16 9:25 ` Yao, Jiewen
[not found] ` <17C6B87A036D5709.13290@groups.io>
2024-04-16 9:36 ` Yao, Jiewen [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=MW4PR11MB5872573187985EB3982DA2158C082@MW4PR11MB5872.namprd11.prod.outlook.com \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox