From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by spool.mail.gandi.net (Postfix) with ESMTPS id 66C227803CC for ; Thu, 31 Aug 2023 02:34:54 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=sy07EkMHzRVR+QDug7yV8vLoxjZKwzDYRshWkHfeW/g=; c=relaxed/simple; d=groups.io; h=ARC-Seal:ARC-Message-Signature:ARC-Authentication-Results:From:To:CC:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding; s=20140610; t=1693449293; v=1; b=byMr+BHibiH3+HlJX0gQP7o8AU+QDvRKRUr6rNppW0NZHB3PaL/b5jRsXkj/8GwzkaeU0IKB FktuN1IC9zv5c3mzYc2YmxGiPaSNfEQZ+9qLRFb0LYgS44yPLwYP7MUs3kTLC2W+s1e0n8IYcSl rwarMqmGH8CdKAxgafIYZLyI= X-Received: by 127.0.0.2 with SMTP id QzCbYY7687511xTZOlR7YTV2; Wed, 30 Aug 2023 19:34:53 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [134.134.136.20]) by mx.groups.io with SMTP id smtpd.web11.8493.1693449291993384354 for ; Wed, 30 Aug 2023 19:34:52 -0700 X-IronPort-AV: E=McAfee;i="6600,9927,10818"; a="365996986" X-IronPort-AV: E=Sophos;i="6.02,215,1688454000"; d="scan'208";a="365996986" X-Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Aug 2023 19:34:50 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.01,202,1684825200"; d="scan'208";a="882959271" X-Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16]) by fmsmga001.fm.intel.com with ESMTP; 30 Aug 2023 19:34:55 -0700 X-Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.27; Wed, 30 Aug 2023 19:34:50 -0700 X-Received: from ORSEDG601.ED.cps.intel.com (10.7.248.6) by orsmsx610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.27 via Frontend Transport; Wed, 30 Aug 2023 19:34:50 -0700 X-Received: from NAM04-DM6-obe.outbound.protection.outlook.com (104.47.73.42) by edgegateway.intel.com (134.134.137.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.27; Wed, 30 Aug 2023 19:34:50 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=lIib50QSCixDUVuxwZ9w4KF8YFiY1aM9706k34whnT03nP14gI7JJO+lSR5Fd2XCkbewRRrgWyxbx4Ac1QeBPgbtcxQDAYbdn6UGscFnAdTgeMqbfVCMGkI7+EuhmiEO9K4m8GCP2cTA2nqkghyhqSYUlCgMUjrtN4EiX66fkaAOxAR9gQpBoQskG/0Oml/x7F0VPVD4txj7dOVpenU8CpyGn9CRv9dWKFGnTVrcc5f04b6AxFRyzi3XQuYHl9K/8V8CWDuGP/9IsV3skR+S45aNd8InbqT9q8c32sD9+NjUYLHfJZZZLyZj0NB7dgKI/1EusVlCEh4iOQbBSfN3tQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=X5WplEz2pMybsAHIHnMqfViO89T/BGNwkruj5fwseCA=; b=H4L6mYGkr3iStvkLjFE/8bSDnSK2UdepqYNjcdP921M/rgdah6trWws5x4ifBUb713VzGcdtLHbGSbCygW/TP6NUNjvN+G/uEjrIq7q6yh5DER7plhF8wwFF9g6CiV3F9UlA6tGM0bqKtv84yk+6+C8DYsVRN43fjztHkneeZ0JkPDSpEbA5KBaFo0YWJ2hHGCYU+KSyCMpiG8YlkCSKTAwSZdWAr5g5vkcR+OW5238Qp3hAmREsMqJzR622lOqi0FJkasbfIVpo74pJ94aq5tcH6ua/iqJmZmN4JeZ/40ls+cjwGo8rKug8tbeNCtHCyC7851UrvaFTli5bNYgv9Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com (2603:10b6:303:169::14) by DM6PR11MB4562.namprd11.prod.outlook.com (2603:10b6:5:2a8::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6745.20; Thu, 31 Aug 2023 02:34:47 +0000 X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::fdf8:dc0e:db69:f35b]) by MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::fdf8:dc0e:db69:f35b%4]) with mapi id 15.20.6699.035; Thu, 31 Aug 2023 02:34:47 +0000 From: "Yao, Jiewen" To: "devel@edk2.groups.io" , "spbrogan@outlook.com" , "Hou, Wenxing" CC: "afish@apple.com" , "quic_llindhol@quicinc.com" , "Kinney, Michael D" Subject: Re: [edk2-devel] [edk2/add_mbedtls PATCH 0/9] *** Add HMAC/HKDF/RSA/HASH features based on Mbedtls *** Thread-Topic: [edk2-devel] [edk2/add_mbedtls PATCH 0/9] *** Add HMAC/HKDF/RSA/HASH features based on Mbedtls *** Thread-Index: AQHZ20SWsc1e5v5aKUiHQYITCMkw5rADMN8AgABVBrCAACjFgA== Date: Thu, 31 Aug 2023 02:34:47 +0000 Message-ID: References: <20230830075220.2070-1-wenxing.hou@intel.com> In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MW4PR11MB5872:EE_|DM6PR11MB4562:EE_ x-ms-office365-filtering-correlation-id: 2dbf2f76-0865-4356-12ad-08dba9cad821 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: 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 x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?7VyTsex/Wp+WGAcn4YqXpMmxnf4Z7QrtPnJ9nEwS/lqFjDP0kZo6ronxrz?= =?iso-8859-1?Q?RNqid7Ax7idtnkMIS291SXjEIW2IsU7QXjEJ9UoYWg7aSBHKO0TcpCmI5x?= =?iso-8859-1?Q?otE1+sZNI7MdoukNmgtm3an++URz60M+kMJmkEwJSZHg2JykQwFEV8KF81?= =?iso-8859-1?Q?s8sqEcVpi0L9j1kaEvyvtqMJLuctbRG8qHjy4LkllL5r1kGV1tImfyQlew?= =?iso-8859-1?Q?rmTUYNR4703f57i1hg5M8j2QeSjwy0MJ51MBKqBJjEZ9AkDx/0eDeD4iYJ?= =?iso-8859-1?Q?o5+nqSMwjumqv8e4k5EnP9VgOMnNHSFbK2vW5MPLWjpYc8hQoSVhLWpQps?= =?iso-8859-1?Q?xwnFZwbLO1FA0zToduJmq135sR0erYPo3Qgg33E55y3r9JmtIhZxIinofI?= =?iso-8859-1?Q?y7OWTyUIgUtApW2PWnbGQPZWoA3Z9ALnbpDhSbDiu72raIuL8nroIsEO/j?= =?iso-8859-1?Q?Z7DLJj08mZkSd8Ar6vf5hO/3O2nYjlgF50dwCUag6vx/6pSUELKB0wOhTQ?= =?iso-8859-1?Q?54DyuubnkGpk/B62XVeTpqbmncQHYqzQClEqX665aVi98RDPcjcZIAmyye?= =?iso-8859-1?Q?UtVfPWcCN0UEmJbfO5s4luAiiSFYoJOI3OTFvzMbk1EWPL1FdgODPQzMfw?= =?iso-8859-1?Q?YnGVtnXbuqOmxKet5CbJdjoNbIzXbVwyeIL1bP2H/wjQiYYasJ/K2BUOKU?= =?iso-8859-1?Q?T3ocMAOuL/ClaC+a0mlvLOpCZvzQqZcESLrTYOXo6iHagPq2h0KNeQhbKB?= =?iso-8859-1?Q?+KdeCPqSdR9aUjeY7YivBwzDaY8RUczwxEmWjibZGP+qcY/RgCOQaqOTl5?= =?iso-8859-1?Q?anI7ztfvrUP9ED99sQbTpVx3iKS0nDpqdGXntczW0RUennsNSxpkOnIBVM?= =?iso-8859-1?Q?cwPhZxyk6wr8JaGbbavXCAj3/DkjfDpyvplw6VCmrbVnbuQ5Jdqu8IoPCp?= =?iso-8859-1?Q?z4c7PLNzMj/QRiXzlMAd9/yoTs7CVXan3LiBElU0TohrKL00/052938aDY?= =?iso-8859-1?Q?M5zN117FNwbZ4didumcp5UCuc7ED1sTfDLnGFkBwi6HFxp6gCzWdfnEbg1?= =?iso-8859-1?Q?VkcAWAD3xuvBRFr3T7UOf4mLE4HXqTL/VQiTVMPgudicirqnRHvp4YRY0F?= =?iso-8859-1?Q?N+IuDukD9OAsIJCtLkRi/gqc5P2xeckAGnZ1n0IQpLSpU62fPlKhX9oOas?= =?iso-8859-1?Q?a13jumUpR7x2kBycSGCxxo1YRvMnQTNAsn1m6eqxe25uk1Xzf7xTK1UM/d?= =?iso-8859-1?Q?mb9oJk3eSuzySoxNl3gV/gZPIApVlP6FiPHuWmtTU6mSl9v0URAPevXddQ?= =?iso-8859-1?Q?SrDcZnzN8sf2slqR9hrOj0k+JS1IX5fTkrseg/3bIhEXJmwi9xucFXZLUd?= =?iso-8859-1?Q?jRG9y7AIQWbTRNYhJh+wIeuTm7qKom69Gb41otrTTQbmTdX4F2QE+fwors?= =?iso-8859-1?Q?VKs+PTEgofXp8vHjjxTpSVXE3Vta3oI4IMgEFRRsa4UbX5CpDlT/57vz3L?= =?iso-8859-1?Q?EDmuUXXq/W3CSWkxUMWIFvXZkdKB5j8An/YWdzGkzKNPOapdzM9F/GGPkO?= =?iso-8859-1?Q?ADgxNorK0QNhuwbOc05DNO7NAniqVqQrz1gcJvJvbfMyNhwZGP6cMicCdT?= =?iso-8859-1?Q?bNFOyF4uNS7n7/pH58U47K+y71Oj+brAYX?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB5872.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 2dbf2f76-0865-4356-12ad-08dba9cad821 X-MS-Exchange-CrossTenant-originalarrivaltime: 31 Aug 2023 02:34:47.7472 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: iHegdupA3aPoXRkyOL/OUzlcnY27fSROz/crIuJYtNRNXdiRyuUyI4wItGx88Z6zupRIZNUADjV3S1w/g4pLbg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB4562 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,jiewen.yao@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: fsD37vNBVEs2W4cbngpSDvEOx7686176AA= Content-Language: en-US Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20140610 header.b=byMr+BHi; arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}"); dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io Hi Sean/Andrew/Leif/Mike Now, I think we actually have multiple options to handle this: 1) CryptoPkg in edk2 repo (add MbedTls to existing CryptoPkg) 2) CryptoPkg in edk2 repo + a new MbedTlsCryptoPkg in edk2 repo 3) CryptoPkg in edk2 repo + MbedTlsCryptoPkg in a new repo 4) Move CryptoPkg from edk2 repo to OpensslCryptoPkg in a new repo + MbedTl= sCryptoPkg in another new repo Current patch is for option 1). Sean's proposal is for option 4). I feel 4) is very aggressive. My worry is that it will involve many infrast= ructure change such as CI, and all edk2 platforms. What about 2) or 3) ? Thank you Yao, Jiewen > -----Original Message----- > From: Yao, Jiewen > Sent: Thursday, August 31, 2023 8:10 AM > To: devel@edk2.groups.io; spbrogan@outlook.com; Hou, Wenxing > > Cc: afish@apple.com; quic_llindhol@quicinc.com; Kinney, Michael D > > Subject: RE: [edk2-devel] [edk2/add_mbedtls PATCH 0/9] *** Add > HMAC/HKDF/RSA/HASH features based on Mbedtls *** >=20 > Hi Sean > Thanks for the feedback. Personally, I don't have strong opinion on this. >=20 > Since this is a big change, I would like to have Steward member's opinion= . >=20 > Hi Andrew/Leif/Mike > What do you think? >=20 > Thank you > Yao, Jiewen >=20 >=20 > > -----Original Message----- > > From: devel@edk2.groups.io On Behalf Of Sean > > Sent: Thursday, August 31, 2023 2:57 AM > > To: devel@edk2.groups.io; Hou, Wenxing > > Subject: Re: [edk2-devel] [edk2/add_mbedtls PATCH 0/9] *** Add > > HMAC/HKDF/RSA/HASH features based on Mbedtls *** > > > > I appreciate and really like this work to enable mbedtls but I don't > > like the idea of adding another submodule to edk2. > > > > For a long time there has been discussion about formalizing the > > abstraction of the edk2 crypto api so that it would be practical to > > implement edk2's crypto using various libraries.=A0=A0 I propose we rem= ove > > openssl from the edk2 CryptoPkg and into the OpenSslCryptoPkg in anothe= r > > new tianocore repository dedicated to OpenSsl.=A0 MbedTls could then be > > checked into the MbedTlsCryptoPkg and added to another new repository. > > This would also have the benefit of breaking the tight coupling of edk2 > > stable tags from the crypto used in the code base (crypto has more > > widely tracked vulnerabilities). > > > > Happy to discuss more if others have different ideas. > > > > Thanks > > > > Sean > > > > > > > > On 8/30/2023 12:52 AM, Wenxing Hou wrote: > > > *** Add BaseCryptLibMbedTls for CryptoPkg, which can be an alternativ= e to > > OpenSSL in some scenarios. There are four features in the patch: > > HMAC/HKDF/RSA/HASH.*** > > > > > > Wenxing Hou (9): > > > CryptoPkg: Add mbedtls submodule for EDKII > > > CryptoPkg: Add mbedtls_config and MbedTlsLib.inf > > > CryptoPkg: Add HMAC functions based on Mbedtls > > > CryptoPkg: Add HKDF functions based on Mbedtls > > > CryptoPkg: Add RSA functions based on Mbedtls > > > CryptoPkg: Add all .inf files for BaseCryptLibMbedTls > > > CryptoPkg: Add Null functions for building pass > > > CryptoPkg: Add MD5/SHA1/SHA2 functions based on Mbedtls > > > CryptoPkg: Add Mbedtls submodule in CI > > > > > > .gitmodules | 3 + > > > .pytool/CISettings.py | 2 + > > > CryptoPkg/CryptoPkg.ci.yaml | 66 +- > > > CryptoPkg/CryptoPkg.dec | 4 + > > > CryptoPkg/CryptoPkgMbedTls.dsc | 280 ++ > > > .../BaseCryptLibMbedTls/BaseCryptLib.inf | 81 + > > > .../BaseCryptLibMbedTls/Bn/CryptBnNull.c | 520 +++ > > > .../Cipher/CryptAeadAesGcmNull.c | 100 + > > > .../BaseCryptLibMbedTls/Cipher/CryptAesNull.c | 159 + > > > .../BaseCryptLibMbedTls/Hash/CryptMd5.c | 234 + > > > .../BaseCryptLibMbedTls/Hash/CryptMd5Null.c | 163 + > > > .../Hash/CryptParallelHashNull.c | 40 + > > > .../BaseCryptLibMbedTls/Hash/CryptSha1.c | 234 + > > > .../BaseCryptLibMbedTls/Hash/CryptSha1Null.c | 166 + > > > .../BaseCryptLibMbedTls/Hash/CryptSha256.c | 227 + > > > .../Hash/CryptSha256Null.c | 162 + > > > .../BaseCryptLibMbedTls/Hash/CryptSha512.c | 447 ++ > > > .../Hash/CryptSha512Null.c | 275 ++ > > > .../BaseCryptLibMbedTls/Hash/CryptSm3Null.c | 164 + > > > .../BaseCryptLibMbedTls/Hmac/CryptHmac.c | 620 +++ > > > .../BaseCryptLibMbedTls/Hmac/CryptHmacNull.c | 359 ++ > > > .../BaseCryptLibMbedTls/InternalCryptLib.h | 44 + > > > .../BaseCryptLibMbedTls/Kdf/CryptHkdf.c | 372 ++ > > > .../BaseCryptLibMbedTls/Kdf/CryptHkdfNull.c | 192 + > > > .../BaseCryptLibMbedTls/PeiCryptLib.inf | 101 + > > > .../BaseCryptLibMbedTls/PeiCryptLib.uni | 25 + > > > .../BaseCryptLibMbedTls/Pem/CryptPemNull.c | 69 + > > > .../Pk/CryptAuthenticodeNull.c | 45 + > > > .../BaseCryptLibMbedTls/Pk/CryptDhNull.c | 150 + > > > .../BaseCryptLibMbedTls/Pk/CryptEcNull.c | 578 +++ > > > .../Pk/CryptPkcs1OaepNull.c | 51 + > > > .../Pk/CryptPkcs5Pbkdf2Null.c | 48 + > > > .../Pk/CryptPkcs7Internal.h | 83 + > > > .../Pk/CryptPkcs7SignNull.c | 53 + > > > .../Pk/CryptPkcs7VerifyEkuNull.c | 152 + > > > .../Pk/CryptPkcs7VerifyEkuRuntime.c | 56 + > > > .../Pk/CryptPkcs7VerifyNull.c | 163 + > > > .../Pk/CryptPkcs7VerifyRuntime.c | 38 + > > > .../BaseCryptLibMbedTls/Pk/CryptRsaBasic.c | 268 ++ > > > .../Pk/CryptRsaBasicNull.c | 121 + > > > .../BaseCryptLibMbedTls/Pk/CryptRsaExt.c | 337 ++ > > > .../BaseCryptLibMbedTls/Pk/CryptRsaExtNull.c | 117 + > > > .../BaseCryptLibMbedTls/Pk/CryptRsaPss.c | 164 + > > > .../BaseCryptLibMbedTls/Pk/CryptRsaPssNull.c | 46 + > > > .../BaseCryptLibMbedTls/Pk/CryptRsaPssSign.c | 231 + > > > .../Pk/CryptRsaPssSignNull.c | 60 + > > > .../BaseCryptLibMbedTls/Pk/CryptTsNull.c | 42 + > > > .../BaseCryptLibMbedTls/Pk/CryptX509Null.c | 753 ++++ > > > .../BaseCryptLibMbedTls/Rand/CryptRandNull.c | 56 + > > > .../BaseCryptLibMbedTls/RuntimeCryptLib.inf | 92 + > > > .../BaseCryptLibMbedTls/RuntimeCryptLib.uni | 22 + > > > .../BaseCryptLibMbedTls/SecCryptLib.inf | 84 + > > > .../BaseCryptLibMbedTls/SecCryptLib.uni | 17 + > > > .../BaseCryptLibMbedTls/SmmCryptLib.inf | 92 + > > > .../BaseCryptLibMbedTls/SmmCryptLib.uni | 22 + > > > .../SysCall/ConstantTimeClock.c | 75 + > > > .../BaseCryptLibMbedTls/SysCall/CrtWrapper.c | 58 + > > > .../SysCall/RuntimeMemAllocation.c | 462 ++ > > > .../SysCall/TimerWrapper.c | 198 + > > > .../BaseCryptLibMbedTls/TestBaseCryptLib.inf | 78 + > > > CryptoPkg/Library/MbedTlsLib/CrtWrapper.c | 96 + > > > CryptoPkg/Library/MbedTlsLib/EcSm2Null.c | 495 +++ > > > .../Include/mbedtls/mbedtls_config.h | 3823 ++++++++++++++= +++ > > > CryptoPkg/Library/MbedTlsLib/MbedTlsLib.inf | 173 + > > > .../Library/MbedTlsLib/MbedTlsLibFull.inf | 177 + > > > CryptoPkg/Library/MbedTlsLib/mbedtls | 1 + > > > 66 files changed, 14683 insertions(+), 3 deletions(-) > > > create mode 100644 CryptoPkg/CryptoPkgMbedTls.dsc > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/BaseCryptLib.inf > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Bn/CryptBnNull.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Cipher/CryptAeadAesGcmNull.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Cipher/CryptAesNull.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptMd5.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptMd5Null.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptParallelHashNull.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha1.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha1Null.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha256.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha256Null.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha512.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha512Null.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSm3Null.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Hmac/CryptHmac.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Hmac/CryptHmacNull.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/InternalCryptLib.h > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Kdf/CryptHkdf.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Kdf/CryptHkdfNull.c > > > create mode 100644 > CryptoPkg/Library/BaseCryptLibMbedTls/PeiCryptLib.inf > > > create mode 100644 > CryptoPkg/Library/BaseCryptLibMbedTls/PeiCryptLib.uni > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pem/CryptPemNull.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptAuthenticodeNull.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptDhNull.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptEcNull.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs1OaepNull.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs5Pbkdf2Null.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7Internal.h > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7SignNull.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7VerifyEkuNull.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7VerifyEkuRuntime.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7VerifyNull.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7VerifyRuntime.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaBasic.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaBasicNull.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaExt.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaExtNull.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaPss.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaPssNull.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaPssSign.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaPssSignNull.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptTsNull.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptX509Null.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/Rand/CryptRandNull.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/RuntimeCryptLib.inf > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/RuntimeCryptLib.uni > > > create mode 100644 > CryptoPkg/Library/BaseCryptLibMbedTls/SecCryptLib.inf > > > create mode 100644 > CryptoPkg/Library/BaseCryptLibMbedTls/SecCryptLib.uni > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/SmmCryptLib.inf > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/SmmCryptLib.uni > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/SysCall/ConstantTimeClock.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/SysCall/CrtWrapper.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/SysCall/RuntimeMemAllocation.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/SysCall/TimerWrapper.c > > > create mode 100644 > > CryptoPkg/Library/BaseCryptLibMbedTls/TestBaseCryptLib.inf > > > create mode 100644 CryptoPkg/Library/MbedTlsLib/CrtWrapper.c > > > create mode 100644 CryptoPkg/Library/MbedTlsLib/EcSm2Null.c > > > create mode 100644 > > CryptoPkg/Library/MbedTlsLib/Include/mbedtls/mbedtls_config.h > > > create mode 100644 CryptoPkg/Library/MbedTlsLib/MbedTlsLib.inf > > > create mode 100644 CryptoPkg/Library/MbedTlsLib/MbedTlsLibFull.inf > > > create mode 160000 CryptoPkg/Library/MbedTlsLib/mbedtls > > > > > > > > >=20 > > -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#108182): https://edk2.groups.io/g/devel/message/108182 Mute This Topic: https://groups.io/mt/101048094/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-