From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail04.groups.io (mail04.groups.io [45.79.224.9]) by spool.mail.gandi.net (Postfix) with ESMTPS id B3E1E7803E0 for ; Tue, 16 Apr 2024 09:36:54 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=giNvEqxra2sv94JfxOBgV/YcOC9g2pA261ga6O8lEZU=; c=relaxed/simple; d=groups.io; h=From:To:CC:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Resent-Date:Resent-From:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding; s=20240206; t=1713260213; v=1; b=IPSmWmY/K49vzADw5bA5i2JAB4CsDBhq/BYozagODkpxG29e5OC8FTpiMcif/rz3tX4D4a8I 1BsSbT8VG9wrfKm2sXvzWg5oJSfKLJEdqL3yjfqpkUx8BcrnLDgk/WE8XJBaqMvrsfnkSH6l4rB hhaajzvxjDbywVAUWMvm4F3Gm3UAdBrWkCF2SomnuCzngQBQEkhu1ildzQJztSbCW37xIM49lVT uzU0FpmTjiAx8krd9YRdKLYNHdavlnIOzPmhk2yucTIgb5xmRqIzJF5OT3yVSG4JweNDMrFTckP 9JyjpK7ifZhF2vm5YIgRh3KdOjE1NxN1gckuDOCLAtxRA== X-Received: by 127.0.0.2 with SMTP id pKPyYY7687511xDk2bWKIWV5; Tue, 16 Apr 2024 02:36:53 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.17]) by mx.groups.io with SMTP id smtpd.web11.16023.1713260212367504165 for ; Tue, 16 Apr 2024 02:36:52 -0700 X-CSE-ConnectionGUID: CMDzlJadQ8mjXRBXgkog/Q== X-CSE-MsgGUID: 60wTFqWsQeeTF+j38YRHww== X-IronPort-AV: E=McAfee;i="6600,9927,11045"; a="8548670" X-IronPort-AV: E=Sophos;i="6.07,205,1708416000"; d="scan'208";a="8548670" X-Received: from orviesa002.jf.intel.com ([10.64.159.142]) by fmvoesa111.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Apr 2024 02:36:52 -0700 X-CSE-ConnectionGUID: GYhzmM8yS+aKB60Z7ohLgA== X-CSE-MsgGUID: X6PmipM5TBinyrCwwmzgiw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.07,205,1708416000"; d="scan'208";a="53183087" X-Received: from fmsmsx601.amr.corp.intel.com ([10.18.126.81]) by orviesa002.jf.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 16 Apr 2024 02:36:52 -0700 X-Received: from fmsmsx601.amr.corp.intel.com (10.18.126.81) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Tue, 16 Apr 2024 02:36:51 -0700 X-Received: from FMSEDG603.ED.cps.intel.com (10.1.192.133) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35 via Frontend Transport; Tue, 16 Apr 2024 02:36:50 -0700 X-Received: from NAM10-DM6-obe.outbound.protection.outlook.com (104.47.58.100) by edgegateway.intel.com (192.55.55.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Tue, 16 Apr 2024 02:36:50 -0700 X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com (2603:10b6:303:169::14) by DS0PR11MB8134.namprd11.prod.outlook.com (2603:10b6:8:15a::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7472.26; Tue, 16 Apr 2024 09:36:48 +0000 X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::be3f:5a4f:5180:2ba9]) by MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::be3f:5a4f:5180:2ba9%4]) with mapi id 15.20.7472.027; Tue, 16 Apr 2024 09:36:48 +0000 From: "Yao, Jiewen" To: "devel@edk2.groups.io" , "Yao, Jiewen" , "Hou, Wenxing" , "Kinney, Michael D" CC: Sean Brogan , Joey Vagedes , Liming Gao , Andrew Fish , "Liu, Zhiguang" , "Kumar, Rahul R" Subject: Re: [edk2-devel] [PATCH 0/9] Add DeviceSecurity feature based on PFP 1.06 spec Thread-Topic: [edk2-devel] [PATCH 0/9] Add DeviceSecurity feature based on PFP 1.06 spec Thread-Index: AQHahKXki6ut5M8/hk6icfuC7k+hLrFgF8YAgAiSe4CAAgwUcIAAAnyw Date: Tue, 16 Apr 2024 09:36:47 +0000 Message-ID: References: <20240402023125.4168-1-wenxing.hou@intel.com> <17C6B87A036D5709.13290@groups.io> In-Reply-To: <17C6B87A036D5709.13290@groups.io> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MW4PR11MB5872:EE_|DS0PR11MB8134:EE_ x-ms-office365-filtering-correlation-id: 34ec5a1e-6305-48eb-f594-08dc5df8bcbb x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: 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 x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?eeM5JvdjhAO7yvbF36BxlK0bpq9cQ+xuXIj1j1rK60g91Ci84a+BLkzf94ZP?= =?us-ascii?Q?3daSS5+QuBQv0ujoDz7HFJwTWmtjljVLhKXVliY9CMbKDSCOF8zUyblrORrc?= =?us-ascii?Q?JREOAwZGt8eOAoAu+K0TydrF9hqfyPjs8QBQVEPsrZNiub6DmF4dCyNyiI8G?= =?us-ascii?Q?I7hMszPs8YW6g5ocXO0q7T40WELY1zG3WOIe6bnYd+sk84HDe5Sn4UOLvlIK?= =?us-ascii?Q?o5l+dj3qOFM/uHKBj7cNbdaqmV2FoWMUpOlUrtLbvcYtL3R+QYH3oL21MdSc?= =?us-ascii?Q?gQiyY8/6AcSYwXgGAED6wuieygqjhXH+RLm9z8dysQqvFm72+TLdsRZa7NLk?= =?us-ascii?Q?J2TX3Ck2uFX8+23Aqraay6g6uzo/WpgnudccRi4AFxg0oR8PpvWWvI3S/kTT?= =?us-ascii?Q?qkzaBFh5SoEne7JlMp+V79O6T7B0oGxVkruh+Kfzo1jE624Kk5CY//53frCZ?= =?us-ascii?Q?3jj8m0jiwSZowhMC22RW75BUrxI9oltpWhm0SqyFjwNtQjvveyXr6Erp8uZV?= =?us-ascii?Q?7avvw2TLysylj6/KzS9GkNx5FxWZ9MQ2P5ZN5S36Btre4NpuSvIHwzkZPUuV?= =?us-ascii?Q?8x99HujZUSf+vOvd5Y41wV6zZDk+tYuOQOQQtVYFOm7dJfNDrbujJPwDwJFh?= =?us-ascii?Q?mw+ITwGuptQ3U5KNcgEXyc/7ip/F1y6SHjv0a6c3Cq2IpCu6bqb1bzG+0a2I?= =?us-ascii?Q?aAfrF429qbAwi4swP9B7Qm8DV6qbutTAOVsMWhBWdA+UsH0El+lxBApsAUxh?= =?us-ascii?Q?whXeGCUNO8aOXkPtSRCLfjQg2l6/1OBTtDKg90K0k1x4DWdyTqFF9TMwxuPb?= =?us-ascii?Q?06NAGm6YUizLee7chylGq8jLLpCP7eTdHBCSzourTiS9qcxuBVJIuOMLvG3y?= =?us-ascii?Q?G9WRlUXDzBPDDZudsUd2ACb2F3imEqSxmAqQSCHych8gBU6N1Bppb44BFGfE?= =?us-ascii?Q?Sd+ZNBNii61CyxorcH438e8MT9/BUqP3csDP2UjVxoQDxAuYeeTreWbUuRt2?= =?us-ascii?Q?YJHAgMeAkmful1UdqemKi9K5JewWem6eBUxRtaZn9WYNdyb+el/3aJVNluxi?= =?us-ascii?Q?KPO6d/axlM/SUI2Shh/c9onASdVDS2vGh3wdXtSzqOd/pvNcGwhj3PyGJglw?= =?us-ascii?Q?/blsYcW1bQtlHvmaPc1EpNHtd4EXCyJ3xZ4WYW+JctTuFhIZrasog1P8ANMW?= =?us-ascii?Q?IZtX2lrQT1ZB7n67CdyPcp+N1+t4H/QOWKeZM3qY1Hx2Ubu4j0BtUJh0Ckb/?= =?us-ascii?Q?TD1D/G3apwr+wawromnkYbzfQv9Y7tqc/OHKUCK8NOgB3Npn8cqARLt49KFF?= =?us-ascii?Q?cyNJJfJGhabWsSiSkwHR6xPe1R27vZVBYTqdG6G+FMcIdxUyjlOasajPORXO?= =?us-ascii?Q?nRuk9610QmG2vIjE4svdKmGrhOtW1ubGHzRgyzk3SdFC802R7v4RYX1cwpat?= =?us-ascii?Q?da6e93WfNoQguvpwbwLaghvAbrSsrSvYagmVzM/pxvMI1F4lSXo8fZhpQPBk?= =?us-ascii?Q?3xsCJHqRsNso0eSf73F09S8uwEiActVfbIZfT9rhINizEcW9jSrVtjgfq7fK?= =?us-ascii?Q?n6wHvIyNgCKkGMsa44cvIPeLavkjh1Cr27cEAU5N?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB5872.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 34ec5a1e-6305-48eb-f594-08dc5df8bcbb X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Apr 2024 09:36:47.9209 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: Px8hzbV9KLqNAo0PNV3szywo4bdGh+J359VBuKNaq2ReEXFCw1b/99cqwpwRRVpsQDqNSqpQJNp6ob8lbzfRNA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR11MB8134 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Resent-Date: Tue, 16 Apr 2024 02:36:52 -0700 Resent-From: jiewen.yao@intel.com Reply-To: devel@edk2.groups.io,jiewen.yao@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: tf7gIil4Al1rdOeuGKgRs6S0x7686176AA= Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20240206 header.b="IPSmWmY/"; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 45.79.224.9 as permitted sender) smtp.mailfrom=bounce@groups.io Hi Wenxing I just realized that this libspdm submodule does NOT use the latest tag. Since DMTF release 3.3.0 for libspdm https://github.com/DMTF/libspdm/releas= es/tag/3.3.0, I recommend we update to the latest one. Thank you Yao, Jiewen > -----Original Message----- > From: devel@edk2.groups.io On Behalf Of Yao, Jiewe= n > Sent: Tuesday, April 16, 2024 5:26 PM > To: Hou, Wenxing ; Kinney, Michael D > ; devel@edk2.groups.io > Cc: Sean Brogan ; Joey Vagedes > ; Liming Gao ; Andrew > Fish ; Liu, Zhiguang ; Kumar, Ra= hul R > > Subject: Re: [edk2-devel] [PATCH 0/9] Add DeviceSecurity feature based on= PFP > 1.06 spec >=20 > Reviewed-by: Jiewen Yao >=20 > > -----Original Message----- > > From: Hou, Wenxing > > Sent: Monday, April 15, 2024 10:08 AM > > To: Kinney, Michael D ; devel@edk2.groups.i= o > > Cc: Sean Brogan ; Joey Vagedes > > ; Liming Gao ; Andrew > > Fish ; Liu, Zhiguang ; Kumar, = Rahul > R > > ; Yao, Jiewen > > Subject: RE: [PATCH 0/9] Add DeviceSecurity feature based on PFP 1.06 s= pec > > > > Hi Mike, > > > > I have submitted PATCH v3, which updated the Readme.rst for libspdm > submodule > > license. And I have added Leif. > > Please review the PATCH v3. > > > > For your second feedback, I have investigate the situation. > > > > If we use 'git submodule update --init' to clone the submodule, the > > mbedtls/openssl/cmocka in libspdm will not be cloned due to the absenc= e of > the > > '--recursive' option. > > And it will not affect the build and use of DeviceSecurity. > > > > > > Thanks, > > Wenxing > > > > > > -----Original Message----- > > From: Kinney, Michael D > > Sent: Tuesday, April 9, 2024 11:14 PM > > To: Hou, Wenxing ; devel@edk2.groups.io > > Cc: Sean Brogan ; Joey Vagedes > > ; Liming Gao ; Andrew > > Fish ; Liu, Zhiguang ; Kumar, = Rahul > R > > ; Yao, Jiewen ; Kinney, > > Michael D > > Subject: RE: [PATCH 0/9] Add DeviceSecurity feature based on PFP 1.06 s= pec > > > > +Leif > > > > Adding a new submodule requires review by the stewards to review the li= cense > > and the health and support of the submodule project. > > > > The top level Readme also requires updates. It lists all the submodule= s and > > licenses used. Please update this series with the Readme changes. > > > > https://github.com/tianocore/edk2?tab=3Dreadme-ov-file#license-details > > > > I also notice that libspdm has its own .gitmodules file that pulls in m= ore > > submodules. > > > > [submodule "os_stub/openssllib/openssl"] > > path =3D os_stub/openssllib/openssl > > url =3D https://github.com/openssl/openssl > > [submodule "os_stub/mbedtlslib/mbedtls"] > > path =3D os_stub/mbedtlslib/mbedtls > > url =3D https://github.com/ARMmbed/mbedtls > > [submodule "unit_test/cmockalib/cmocka"] > > path =3D unit_test/cmockalib/cmocka > > url =3D https://git.cryptomilk.org/projects/cmocka.git > > > > > > edk2 already had openssl and mbedtls as submodules, does this mean that > > openssl and mbedtls will be cloned twice in 2 different locations now? > > > > The edk2 project had issues with the stability of the cmocka server and= changed > > to a tianocore mirror of the cmocka submodule to improve CI stability. = This is > > another submodule that will be cloned twice and may reintroduce the pot= ential > > for CI stability issues. > > > > Thanks, > > > > Mike > > > > > -----Original Message----- > > > From: Hou, Wenxing > > > Sent: Monday, April 1, 2024 7:31 PM > > > To: devel@edk2.groups.io > > > Cc: Sean Brogan ; Joey Vagedes > > > ; Kinney, Michael D > > > ; Liming Gao ; > > > Andrew Fish ; Liu, Zhiguang = ; > > > Kumar, Rahul R ; Yao, Jiewen > > > > > > Subject: [PATCH 0/9] Add DeviceSecurity feature based on PFP 1.06 spe= c > > > > > > REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D2479 > > > > > > In PFP spec 1.06, platform firmware records the device certificate an= d > > > device measurement for each SPDM responder. > > > This PATCH set implement the DeviceSecurityLib to support spdm device > > > Authentication and Measurement. > > > > > > Libspdm as submodule is to support DeviceSecurity feature: > > > https://github.com/DMTF/libspdm > > > > > > TCG PFP spec 1.06: > > > https://trustedcomputinggroup.org/resource/pc-client-specific- > > > platform-firmware-profile-specification/ > > > > > > The POC branch: > > > https://github.com/tianocore/edk2-staging/tree/DeviceSecurity > > > > > > And the PATCH set has passed the EDKII CI: > > > https://github.com/tianocore/edk2/pull/5508 > > > > > > Cc: Sean Brogan > > > Cc: Joey Vagedes > > > Cc: Michael D Kinney > > > Cc: Liming Gao > > > Cc: Andrew Fish > > > Cc: Zhiguang Liu > > > Cc: Rahul Kumar > > > Cc: Jiewen Yao > > > Signed-off-by: Wenxing Hou > > > > > > Wenxing Hou (9): > > > MdePkg: Add SPDM1.2 support. > > > MdePkg: Add TCG PFP 1.06 support. > > > MdePkg: Add devAuthBoot GlobalVariable > > > MdeModulePkg/Variable: Add TCG SPDM device measurement update > > > SecurityPkg: Add TCG PFP 1.06 support. > > > SecurityPkg: add DeviceSecurity support > > > .pytool/CISettings.py: add libspdm submodule. > > > .gitmodule: Add libspdm submodule for EDKII > > > SecurityPkg: Add libspdm submodule > > > > > > .gitmodules | 3 + > > > .pytool/CISettings.py | 2 + > > > MdeModulePkg/MdeModulePkg.dec | 5 + > > > .../Variable/RuntimeDxe/Measurement.c | 38 +- > > > .../RuntimeDxe/VariableRuntimeDxe.inf | 3 + > > > .../RuntimeDxe/VariableSmmRuntimeDxe.inf | 3 + > > > MdePkg/Include/Guid/GlobalVariable.h | 8 +- > > > MdePkg/Include/Guid/ImageAuthentication.h | 5 +- > > > MdePkg/Include/IndustryStandard/Spdm.h | 1112 > > > ++++++++++++++++- > > > .../IndustryStandard/UefiTcgPlatform.h | 186 ++- > > > .../OsStub/CryptlibWrapper/CryptlibWrapper.c | 970 ++++++++++++++ > > > .../CryptlibWrapper/CryptlibWrapper.inf | 38 + > > > .../OsStub/MemLibWrapper/MemLibWrapper.c | 177 +++ > > > .../OsStub/MemLibWrapper/MemLibWrapper.inf | 33 + > > > .../PlatformLibWrapper/PlatformLibWrapper.c | 85 ++ > > > .../PlatformLibWrapper/PlatformLibWrapper.inf | 33 + > > > .../SpdmLib/Include/Stub/SpdmLibStub.h | 347 +++++ > > > .../SpdmLib/Include/hal/LibspdmStdBoolAlt.h | 23 + > > > .../SpdmLib/Include/hal/LibspdmStdDefAlt.h | 16 + > > > .../SpdmLib/Include/hal/LibspdmStdIntAlt.h | 25 + > > > .../DeviceSecurity/SpdmLib/Include/hal/base.h | 94 ++ > > > .../SpdmLib/Include/hal/library/debuglib.h | 39 + > > > .../SpdmLib/Include/library/spdm_lib_config.h | 394 ++++++ > > > .../DeviceSecurity/SpdmLib/SpdmCommonLib.inf | 47 + > > > .../DeviceSecurity/SpdmLib/SpdmCryptLib.inf | 45 + > > > .../SpdmLib/SpdmDeviceSecretLibNull.inf | 36 + > > > .../SpdmLib/SpdmRequesterLib.inf | 59 + > > > .../SpdmLib/SpdmResponderLib.inf | 61 + > > > .../SpdmLib/SpdmSecuredMessageLib.inf | 44 + > > > .../SpdmLib/SpdmTransportMctpLib.inf | 38 + > > > .../SpdmLib/SpdmTransportPciDoeLib.inf | 38 + > > > SecurityPkg/DeviceSecurity/SpdmLib/libspdm | 1 + > > > .../SpdmSecurityLib/SpdmAuthentication.c | 697 +++++++++++ > > > .../SpdmSecurityLib/SpdmConnectionInit.c | 481 +++++++ > > > .../SpdmSecurityLib/SpdmMeasurement.c | 714 +++++++++++ > > > .../SpdmSecurityLib/SpdmSecurityLib.c | 148 +++ > > > .../SpdmSecurityLib/SpdmSecurityLib.inf | 54 + > > > .../SpdmSecurityLib/SpdmSecurityLibInternal.h | 250 ++++ > > > SecurityPkg/Include/Library/SpdmSecurityLib.h | 437 +++++++ > > > SecurityPkg/Include/Library/Tpm2CommandLib.h | 23 +- > > > .../Include/Protocol/DeviceSecurityPolicy.h | 133 ++ > > > .../HashLibBaseCryptoRouterDxe.c | 88 +- > > > .../Library/Tpm2CommandLib/Tpm2NVStorage.c | 122 +- > > > SecurityPkg/SecurityPkg.ci.yaml | 17 +- > > > SecurityPkg/SecurityPkg.dec | 13 +- > > > SecurityPkg/SecurityPkg.dsc | 31 +- > > > SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.c | 61 +- > > > SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf | 4 +- > > > 48 files changed, 7196 insertions(+), 85 deletions(-) create mode > > > 100644 > > > SecurityPkg/DeviceSecurity/OsStub/CryptlibWrapper/CryptlibWrapper.c > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/OsStub/CryptlibWrapper/CryptlibWrapper.inf > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/OsStub/MemLibWrapper/MemLibWrapper.c > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/OsStub/MemLibWrapper/MemLibWrapper.inf > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/OsStub/PlatformLibWrapper/PlatformLibWrapp= e > > > r.c > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/OsStub/PlatformLibWrapper/PlatformLibWrapp= e > > > r.inf > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/Include/Stub/SpdmLibStub.h > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdBoolAlt.h > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdDefAlt.h > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdIntAlt.h > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/base.h > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/library/debuglib.h > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/Include/library/spdm_lib_config.h > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmCommonLib.inf > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmCryptLib.inf > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmDeviceSecretLibNull.inf > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmRequesterLib.inf > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmResponderLib.inf > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmSecuredMessageLib.inf > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmTransportMctpLib.inf > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmLib/SpdmTransportPciDoeLib.inf > > > create mode 160000 SecurityPkg/DeviceSecurity/SpdmLib/libspdm > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmAuthentication.c > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmConnectionInit.c > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmMeasurement.c > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLib.c > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLib.inf > > > create mode 100644 > > > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLibInternal.h > > > create mode 100644 SecurityPkg/Include/Library/SpdmSecurityLib.h > > > create mode 100644 > > > SecurityPkg/Include/Protocol/DeviceSecurityPolicy.h > > > > > > -- > > > 2.26.2.windows.1 >=20 >=20 >=20 >=20 >=20 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#117872): https://edk2.groups.io/g/devel/message/117872 Mute This Topic: https://groups.io/mt/105281046/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-