From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by spool.mail.gandi.net (Postfix) with ESMTPS id B4BDB740034 for ; Wed, 6 Sep 2023 02:54:26 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=u5ougTheMj2sOcjBKgX7spZlIwYGa0xwAMnI019vR+Q=; c=relaxed/simple; d=groups.io; h=ARC-Seal:ARC-Message-Signature:ARC-Authentication-Results:From:To:CC:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding; s=20140610; t=1693968865; v=1; b=OjGXA5JRBAQWUrX+tJTroaiDuyDiDHflCkjdHK62cHgUDqidoDTpAFIsrwk33bcDQVrXv5iH 8oSthX1Nep5CcIzP999/+gc9UJsw7XfEgX/jQ+S1FENuuu8YE8KNXuMqHFVb00xLiFs1AI7y+7b TCrx5JeqmUMrvQ5hpRSvdSwo= X-Received: by 127.0.0.2 with SMTP id CPJIYY7687511xsgRhVxnBL9; Tue, 05 Sep 2023 19:54:25 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.120]) by mx.groups.io with SMTP id smtpd.web11.446.1693968864303158569 for ; Tue, 05 Sep 2023 19:54:24 -0700 X-IronPort-AV: E=McAfee;i="6600,9927,10824"; a="375858132" X-IronPort-AV: E=Sophos;i="6.02,230,1688454000"; d="scan'208";a="375858132" X-Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Sep 2023 19:53:37 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10824"; a="1072210087" X-IronPort-AV: E=Sophos;i="6.02,230,1688454000"; d="scan'208";a="1072210087" X-Received: from fmsmsx602.amr.corp.intel.com ([10.18.126.82]) by fmsmga005.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 05 Sep 2023 19:53:36 -0700 X-Received: from fmsmsx610.amr.corp.intel.com (10.18.126.90) by fmsmsx602.amr.corp.intel.com (10.18.126.82) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.27; Tue, 5 Sep 2023 19:53:36 -0700 X-Received: from fmsedg602.ED.cps.intel.com (10.1.192.136) by fmsmsx610.amr.corp.intel.com (10.18.126.90) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.27 via Frontend Transport; Tue, 5 Sep 2023 19:53:36 -0700 X-Received: from NAM12-MW2-obe.outbound.protection.outlook.com (104.47.66.49) by edgegateway.intel.com (192.55.55.71) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.27; Tue, 5 Sep 2023 19:53:35 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZA/3dcVLfDnN++vCS2zbkqH7BLGa5RIaCeScxqu1sJiWS1vWmbc7nLPnX6vWetTlg0v6FlCxDEMe306nqYfc+ec8nUP2eWfMgGmd238bb0Z7taHtvDOA54ZQAGpzdsueI/QiyGd3JjL9I/NwHp5SQ0Jycq7F1H7XHuJ5ETL4012OuHOhPxjmn9jVDm26Q4d/M3RdjXlMzrmOdZObKoowH8CtD4PXYM4iYZKRelhglEFhdo+nz/KJx+AHwxejs3iSbnbHTeTMTKIB2VPA7yB5WEVOQFQfbfOshGVonscmVfAUJCqR3Ug5wo5rQz9O9rNxqrsAuLfD/UPcGri7nbggHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=MagnxWAgHE9HkzmHcIm+b68+gd0xOLfZtvk4BN84pLo=; b=YbEyHop5hdZesCULamQfkFqi8FoQW9670cIzANxDpHNU4/iUfJply2+GD7z9CECrL4AJ2LWLFibQxm5rXAjuU0K7Yyy4rJhXt63btEOOVrTAQWSefncI6LPDeVzULAJw8lIawqqwIm6drxg5n9bH7Mo3elCST9u7EZ+JGXxWeAW25/ycb22ER/5ALpLHyywr19nCCiaN28hHFq7YpmV9MWzjdoRildFlPF/WJg5b3Hbzx1/q8IWiQv1hohd+VQmUizkfkvKXkXJaVNH+4TbLjf9CaTeWL7h+yGb7W1ht+9wofu3x8Z2y+SQup1WNBOB8yKZVIPbKMLm/C0jn0yNuKg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com (2603:10b6:303:169::14) by DM4PR11MB6384.namprd11.prod.outlook.com (2603:10b6:8:8a::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6745.33; Wed, 6 Sep 2023 02:53:28 +0000 X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::fdf8:dc0e:db69:f35b]) by MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::fdf8:dc0e:db69:f35b%4]) with mapi id 15.20.6745.030; Wed, 6 Sep 2023 02:53:28 +0000 From: "Yao, Jiewen" To: "Chen, Zeyi" , "Sheng, W" , "devel@edk2.groups.io" CC: "Wang, Jian J" , "Xu, Min M" , "Wang, Fiona" , "Lu, Xiaoyu1" , "Jiang, Guomin" , "Kinney, Michael D" , "Yu, Ling" Subject: Re: [edk2-devel] [PATCH V7 0/2] Support RSA4096 and RSA3072 Thread-Topic: [edk2-devel] [PATCH V7 0/2] Support RSA4096 and RSA3072 Thread-Index: AQHZy0CxRi9+mBtrj0G49W0wUVJp4q/15FsQgAy0SiCACpsR0IAAEDeQ Date: Wed, 6 Sep 2023 02:53:28 +0000 Message-ID: References: <1779E466B0A8FFE7.8497@groups.io> In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MW4PR11MB5872:EE_|DM4PR11MB6384:EE_ x-ms-office365-filtering-correlation-id: daeae245-4bc5-4237-e398-08dbae8472a2 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: 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 x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-2022-jp?B?KytSbWR4NWpRb2htZXMwSU5Jb29zVzFncktzZWNQWUFxTEd3amtQcGpk?= =?iso-2022-jp?B?ZWFFNTMwR0VTM0VwdUJsMDBoeHo1azZ3UGI3MUFVYmRwMDM4ektZbkdP?= =?iso-2022-jp?B?ZmJPQWp3UTNMdFlkaUQ3dTg5bFBpUVJnRVNwcWQxa3VyR2xVREt1YUlF?= =?iso-2022-jp?B?SUwwYWZBVkxwMHlpeTlLZnNSUTBxTjNPZXFTUlVDY2lBcExYOWI4bE1y?= =?iso-2022-jp?B?OGJXUUZIRW5kb1cxR2tzYm0ySmMxMlhBN01tb3ZMUlFDZm9adWFyY043?= =?iso-2022-jp?B?OTBNU2xJcDRnSEFsUVZJTkhoN3RidGRzTHJqaHB0ejhTeGh1WTNFK3c4?= =?iso-2022-jp?B?R2lobWRiazN2cnhjV0VXMmtyZXZYdFlSMlJKRkFuaW9iSDlBQTc3Z25Y?= =?iso-2022-jp?B?NkQrVzRHb3gwdUpPMDJXKzUvU0g0MTRvOTd3MnVvWVk3MzQzdTlDZWtn?= =?iso-2022-jp?B?UmlHR25kbHEzUjIzVUQrUFRTWG0zN3dPdndzeWZodk41UWhUUERwUm5T?= =?iso-2022-jp?B?eXBScEkwUk1POTRqdDBCZ1c0bDk0KzdYY3IxVTB1dkF0VEs3eUxxRUY0?= =?iso-2022-jp?B?RW5kcVMwaU5ueG1YVzFJcWJDTjZDVE1SaWRmYVVQOWZSb05vVlZnUGxs?= =?iso-2022-jp?B?b1NlTzFjQUJOSDJwK1E1ZFhxN1VjY1RPTHhuWnJkMWcvUUNQZGpZNVk0?= =?iso-2022-jp?B?TDZPM2Znc3J6MzdyLzl5MjVscmVkdkRyakp6bHpSMDczR3djM3hZMFBP?= =?iso-2022-jp?B?RXUrTnFQS0haZXdQQWNZWDFLY0pZaUhqR0NTL3pxL0RqRncvdVR1Z2VE?= =?iso-2022-jp?B?RXdKOVFVeFM4SXZVQkZ0b3lvU0JORmlmQXd2ZlEzbHhXUFVzUWxEVnow?= =?iso-2022-jp?B?MEhKLzhEQ0ZXMVNBaU55UTBJZHg0NGNlWk9vTHJTSVF3NFU2TmMvb2ZH?= =?iso-2022-jp?B?N2dkUklaM2poTkpvT1dRVHVLendWa0FEKzBaMU5CWHB4WGtsN21aRzRG?= =?iso-2022-jp?B?L25XNlJMbTB3WWY0RGpQMGdmc1R3UWc1RHhLZDNieGx0eE83NlREY0dx?= =?iso-2022-jp?B?Q0V5ZG8zUzY0ZjROSURVdnVNcm5TK3FQYktCbXA0ZGhibUdEZ0kxMjNr?= =?iso-2022-jp?B?UWgwTVFTUFpUUWMyVytzVTFBOUcxT3dKc05RaG45NS9MY2RrKzJHbU4y?= =?iso-2022-jp?B?UDlFRGVpTitNUXBlemlNd3ZyeG9kUmptL2NZUnZoakR4YzlGNUc4Y3dT?= =?iso-2022-jp?B?T2k5L3JZK2dQM1RwcFphYVA4T1EyUUxlN1VoOGFjakdIUzJKekdyNVBl?= =?iso-2022-jp?B?V2F1UGd5NndQaXlCNkVJR2RHRVpPNWpvcTNZdDgxVE1DODF6bEdITnBx?= =?iso-2022-jp?B?TUx4Zy8zdWpvMmNUK1dmUFlLdlhjMzZIaVJSaXE4K0NsYVpkdW9MZ2o5?= =?iso-2022-jp?B?d0VzQ01XT2U3YWlQc0srVUoxaDcvZkw2T1RJN3R4ellla3cvTmFKMVQr?= =?iso-2022-jp?B?cTdOTENoK1ZSMUpLeEhmTmZwNkpuY3hHQkNiSEU3ZVFPdHJWeVBudUxh?= =?iso-2022-jp?B?UVJFc1AvYXZqc0tab2ZlSThvQkxlSHFWbjJjR3BHenEwQzltUms5TXRl?= =?iso-2022-jp?B?S0FnR1pxVGJwRTk1bGtEMzRsaE1qM1ovaDAvZHF1UDJuZHhFekZYbUw1?= =?iso-2022-jp?B?K1R0d01tOVBHZVYyaTdOY0NwSHRlQVMwa0JrQVNER1V0SjF3N00xWk0r?= =?iso-2022-jp?B?SUFJR3NCaTBVeGVmWGZqR09jS05Gdk13ck9OZmNZbDZrK3hqVlNwSHF3?= =?iso-2022-jp?B?KzlsWnlkWlV5czJmSUtNUmIxTi9JSnNWUERnT0RUa1NVMTEzdFdqRTV2?= =?iso-2022-jp?B?dUZyYldSNjNIRHp1UlVIZ2ZmUUl2dFR0QjY5aXpoeVJSeVpENnNSVnh4?= =?iso-2022-jp?B?a2tZaFh6WWlXN21Kczl4NjFnSkhxM3BYS25Qb0pISko2Y0cwK1k5NWl1?= =?iso-2022-jp?B?dVcyVGdHd0dzVWNMYVRINnFDbWYwM2lvVmtLSWtvSHcwMnRHTnVEVHJR?= =?iso-2022-jp?B?ZGN5bHZ6bTdlbzArUDhsMkJCWE9qWGEwSk54WHhncTVtVlRjNFZQeXRI?= =?iso-2022-jp?B?VCtmaWhlVk9yeklScnJRblUwYkVQMXVYeFVmejdXMThtNHAxdmcrYXhX?= =?iso-2022-jp?B?bzBRaGE3SDJ3ZWM2SEFTRHI5RWVOK3JVS00yL1YrR0dLZk9mbThJQXYv?= =?iso-2022-jp?B?Q1JPU1V4R3pjc3VXdWpQQmxWWDdtS0F1L0V3V2NXWkRpSnRpRzY4OFlj?= =?iso-2022-jp?B?NUs1Kw==?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB5872.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: daeae245-4bc5-4237-e398-08dbae8472a2 X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Sep 2023 02:53:28.4858 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: vlKiNi8RiiFHFvrFOo6TeAf03U9KCBnfXSF4TU+PJv2zFjLaSPb36eHMfD5ibV4JR/3zH4p/tWhGghU6MYRnHg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR11MB6384 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,jiewen.yao@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: VNaIupV3qTk0BOPtwhQJc2Lfx7686176AA= Content-Language: en-US Content-Type: text/plain; charset="iso-2022-jp" Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20140610 header.b=OjGXA5JR; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io; arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}") Thanks. Reviewed-by: Jiewen Yao > -----Original Message----- > From: Chen, Zeyi > Sent: Wednesday, September 6, 2023 9:56 AM > To: Sheng, W ; devel@edk2.groups.io; Yao, Jiewen > > Cc: Wang, Jian J ; Xu, Min M ; > Wang, Fiona ; Lu, Xiaoyu1 ; > Jiang, Guomin ; Kinney, Michael D > ; Yu, Ling > Subject: RE: [edk2-devel] [PATCH V7 0/2] Support RSA4096 and RSA3072 >=20 > Hi Wei, > We finished some related secureboot tests with the IFWI you provided. Tes= ts are > PASS. > Test point: > Enabled secure boot successfully without issue. > Can support RSA3072 and RSA4096. > Still support original keys/files. >=20 > Best Regards, > Zeyi >=20 > -----Original Message----- > From: Sheng, W > Sent: Wednesday, August 30, 2023 4:02 PM > To: devel@edk2.groups.io; Yao, Jiewen > Cc: Wang, Jian J ; Xu, Min M ; > Chen, Zeyi ; Wang, Fiona ; Lu, > Xiaoyu1 ; Jiang, Guomin ; > Kinney, Michael D ; Yu, Ling > Subject: RE: [edk2-devel] [PATCH V7 0/2] Support RSA4096 and RSA3072 >=20 > Hi Jiewen, > Do you have any comments on the patch V7? > The 2 patches are for CryptoPkg and SecurityPky. > Could you help to review/merge the patches? > Thank you. > BR > Sheng Wei >=20 > > -----Original Message----- > > From: Sheng, W > > Sent: Tuesday, August 22, 2023 1:59 PM > > To: devel@edk2.groups.io; Yao, Jiewen > > Cc: Wang, Jian J ; Xu, Min M > > ; Chen, Zeyi ; Wang, Fiona > > ; Lu, > > Xiaoyu1 ; Jiang, Guomin > > ; Kinney, Michael D > > ; Sheng, W > > Subject: RE: [edk2-devel] [PATCH V7 0/2] Support RSA4096 and RSA3072 > > > > Hi Jiewen, > > I update the patch V6 to V7, drop raw RSA3K and RSA4K. The change is > > in SecurityPkg. > > And I did all the tests which are listed in the cover letter. I got > > the expected results. > > Could you help to review/merge this V7 patch for secure boot feature ? > > Thank you. > > BR > > Sheng Wei > > > > > -----Original Message----- > > > From: devel@edk2.groups.io On Behalf Of Sheng > > > Wei > > > Sent: 2023=1B$BG/=1B(B8=1B$B7n=1B(B10=1B$BF|=1B(B 10:24 > > > To: devel@edk2.groups.io > > > Cc: Yao, Jiewen ; Wang, Jian J > > > ; Xu, Min M ; Chen, Zeyi > > > ; Wang, Fiona ; Lu, > > > Xiaoyu1 ; Jiang, Guomin > > > ; Kinney, Michael D > > > > > > Subject: [edk2-devel] [PATCH V7 0/2] Support RSA4096 and RSA3072 > > > > > > Patch V7: > > > Drop raw RSA3072 and RSA4096. Only use gEfiCertX509Guid for RSA3072 > > > and > > > RSA4096 Do the positive tests and the negative tests below. And got > > > all the expected results. > > > > > > Patch V6: > > > Remove the changes in MdePkg. > > > The changes of patch v6 are in CryptoPkg and SecurityPkg. > > > Set signature type to gEfiCertX509Guid when enroll RSA3072/RSA4096 KE= K. > > > This signature type is used to check the supported signature and > > > show the strings. > > > > > > Patch V5: > > > Using define KEY_TYPE_RSASSA to replace the magic number. > > > > > > Patch V4: > > > Determine the RSA algorithm by a supported algorithm list. > > > > > > Patch V3: > > > Select SHA algorithm automaticly for a unsigned efi image. > > > > > > Patch V2: > > > Determine the SHA algorithm by a supported algorithm list. > > > Create SHA context for each algorithm. > > > > > > Test Case: > > > 1. Enroll a RSA4096 Cert, and execute an RSA4096 signed efi image > > > under UEFI shell. > > > 2. Enroll a RSA3072 Cert, and execute an RSA3072 signed efi image > > > under UEFI shell. > > > 3. Enroll a RSA2048 Cert, and execute an RSA2048 signed efi image > > > under UEFI shell. > > > 4. Enroll an unsigned efi image, execute the unsigned efi image > > > under UEFI shell > > > > > > Test Result: > > > Pass > > > > > > Negative Test Case: > > > 1) Enroll a RSA2048 Cert, execute an unsigned efi image. > > > 2) Enroll a RSA2048 Cert, execute a RSA4096 signed efi image. > > > 3) Enroll a RSA4096 Cert, execute a RSA3072 signed efi image. > > > 4) Enroll a RSA4096 Cert to both DB and DBX, execute the RSA4096 > > > signed efi image. > > > > > > Test Result: > > > Get "Access Denied" when try to execute the efi image. > > > > > > Cc: Jiewen Yao > > > Cc: Jian J Wang > > > Cc: Min Xu > > > Cc: Zeyi Chen > > > Cc: Fiona Wang > > > Cc: Xiaoyu Lu > > > Cc: Guomin Jiang > > > Cc: Michael D Kinney > > > > > > Sheng Wei (2): > > > CryptoPkg/Library/BaseCryptLib: add sha384 and sha512 to > > > ImageTimestampVerify > > > SecurityPkg/SecureBoot: Support RSA 512 and RSA 384 > > > > > > CryptoPkg/Library/BaseCryptLib/Pk/CryptTs.c | 3 +- > > > .../Library/AuthVariableLib/AuthService.c | 218 +++++++++++++++-= -- > > > .../AuthVariableLib/AuthServiceInternal.h | 4 +- > > > .../Library/AuthVariableLib/AuthVariableLib.c | 42 ++-- > > > .../DxeImageVerificationLib.c | 73 +++--- > > > .../SecureBootConfigDxe.inf | 8 + > > > .../SecureBootConfigImpl.c | 50 +++- > > > .../SecureBootConfigImpl.h | 7 + > > > .../SecureBootConfigStrings.uni | 2 + > > > 9 files changed, 324 insertions(+), 83 deletions(-) > > > > > > -- > > > 2.26.2.windows.1 > > > > > > > > > > > >=20 > > > -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#108298): https://edk2.groups.io/g/devel/message/108298 Mute This Topic: https://groups.io/mt/100656918/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-