From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga04.intel.com (mga04.intel.com [192.55.52.120]) by mx.groups.io with SMTP id smtpd.web11.40345.1671500423766018883 for ; Mon, 19 Dec 2022 17:40:23 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=MwpLACNN; spf=pass (domain: intel.com, ip: 192.55.52.120, mailfrom: jiewen.yao@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1671500423; x=1703036423; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=123d4IIGgBoltXz7J0mne1LebMd88S44BXEUJQ62PmY=; b=MwpLACNNOe1j4pMXyKhVtOSzoZLTL0XjXDdkFsan3E3uZidyNDU8oDC4 NBhm0ksE+klAVPfkmW8Z+UqZQWTiP259LiV/PcQmFdF17tobhxDG5sdKG 0GcKMl3B9I7561uj/8SGmm+l19wBnR4/BVwncqtOmZ0vWHQThGXHNDD3+ lhLD/sg9jtnqXqOMmFz/WHoNYljY3D7rdH4gt1lg5rtXyNxRea40ihihp SbhTciMHLILgdgN9sruBZ+0vYUN/npsxCSBUse6KKMMK09wulhlTq6CMP fHzi+rj7QfgKXOXQxVDV/kd1zFkADKFnDOiGws0Sbog9brTLW23BX0UcI w==; X-IronPort-AV: E=McAfee;i="6500,9779,10566"; a="318195022" X-IronPort-AV: E=Sophos;i="5.96,258,1665471600"; d="scan'208";a="318195022" Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Dec 2022 17:40:23 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10566"; a="652920606" X-IronPort-AV: E=Sophos;i="5.96,258,1665471600"; d="scan'208";a="652920606" Received: from orsmsx601.amr.corp.intel.com ([10.22.229.14]) by fmsmga007.fm.intel.com with ESMTP; 19 Dec 2022 17:40:23 -0800 Received: from orsmsx612.amr.corp.intel.com (10.22.229.25) by ORSMSX601.amr.corp.intel.com (10.22.229.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16; Mon, 19 Dec 2022 17:40:22 -0800 Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX612.amr.corp.intel.com (10.22.229.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16; Mon, 19 Dec 2022 17:40:22 -0800 Received: from orsedg603.ED.cps.intel.com (10.7.248.4) by orsmsx610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16 via Frontend Transport; Mon, 19 Dec 2022 17:40:22 -0800 Received: from NAM10-DM6-obe.outbound.protection.outlook.com (104.47.58.101) by edgegateway.intel.com (134.134.137.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.16; Mon, 19 Dec 2022 17:40:21 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=hdDn7+dicTeobvNG7leKuB0H5oIF/h9fCGHEiyb/7H6sdnUWuqwE+0oGEtSXqQOTygAUczcT97aB9PbI+Jpp549xlpY60hZBwSm4GXvqWOUIGpEk0w+c2YcrE0MeMTYtNOsKQqjfDTY/BV3Ser/KDDsHKXmM6QdzFiXunAq1+/QDJIzrfm2DGSnMfOzGbVy3PwooFI+lkVyzIWyZu49bKm28OiqnKdV7wbKJl2xlPUcS2+OHXz7TPNzxqBBnJmN3U8JCdYo844ST36OoaXpx71+19YcVYekMEotxsfU8w3R31vc7jUvB1/zrI4xTDyDOGhrDzGxfVmeG550dl0CGMQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=2SvngnG/jO8/q+36orVVFgYhTDcCFQEUkpB2Y2iHvWU=; b=oQ3ySl6COs0cS45MnWyFCrZ/NWa2xwxbO3RJyiPp/TegSBRNyxWeVHpjXUptFpC68QaQZt5OdOow9XAIobo+zF2nMNEzA/Pv1Y7peZ1eeLIAA4P9XDqvOQx00Bj2moT/+t33H86150RiO8kMG35UQvP+FpeeSzEowjWxXE2dutFKLv/OmWWAqJdGajeAItIrpnCPZMsc2bbiy15pRc4W+OE/iZ6vh5O0zPq5X0RxC1G3PgyzCozBRaAfkRPeUZi5EmWAPCi20p3wtAQ0y1jd2Dt0ye5tyNNE3OooGfXUvNsIOL69JYifyP3rUhRk5GnPA4jihlnOLSJec33zfe0Xdg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from MW4PR11MB5872.namprd11.prod.outlook.com (2603:10b6:303:169::14) by CY5PR11MB6415.namprd11.prod.outlook.com (2603:10b6:930:35::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5924.16; Tue, 20 Dec 2022 01:40:19 +0000 Received: from MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::5f56:1bdc:2eae:c041]) by MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::5f56:1bdc:2eae:c041%8]) with mapi id 15.20.5924.016; Tue, 20 Dec 2022 01:40:19 +0000 From: "Yao, Jiewen" To: "Vang, Judah" , "devel@edk2.groups.io" CC: "Wang, Jian J" , Xiaoyu Lu , "Jiang, Guomin" , "Mistry, Nishant C" Subject: Re: [edk2-devel] [PATCH v1 1/1] CryptoPkg: Need to enable crypto functions Thread-Topic: [edk2-devel] [PATCH v1 1/1] CryptoPkg: Need to enable crypto functions Thread-Index: AQHZFAwiO4vgg+zTWkKzNlu42MZR/q51/8QQ Date: Tue, 20 Dec 2022 01:40:19 +0000 Message-ID: References: <20221107221553.3952-1-judah.vang@intel.com> <17256D461071259B.1802@groups.io> In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MW4PR11MB5872:EE_|CY5PR11MB6415:EE_ x-ms-office365-filtering-correlation-id: 12f7cc61-2aa2-41c7-5399-08dae22b2746 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MW4PR11MB5872.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230022)(376002)(136003)(346002)(366004)(39860400002)(396003)(451199015)(966005)(53546011)(86362001)(9686003)(2906002)(186003)(26005)(71200400001)(107886003)(7696005)(6506007)(478600001)(66899015)(316002)(19627235002)(54906003)(110136005)(66476007)(76116006)(41300700001)(8676002)(83380400001)(66446008)(66556008)(64756008)(4326008)(66946007)(52536014)(8936002)(122000001)(38100700002)(33656002)(82960400001)(5660300002)(55016003)(38070700005);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?hIcqOGw5uoEMEefL+OlEI6nGqjkqR8xBqBv141eShWbAxoEGweIDaeX4OocQ?= =?us-ascii?Q?4n4zGPeWHX/LLPGO9ZEz8JqZJJGrSQIqzNM1MQsee0g/b36f6Ft9XKiFDIaG?= =?us-ascii?Q?WRouOuZJUh9tPy5OP59EVv/xTSQM087TPCKKjtfAnUuNvo2BrYky/VWfrK0c?= =?us-ascii?Q?m25x33NQWfCS68jb4zO0P4Jcuk25Evlu7tTeicacyVdM/9IMjviF2/Z92Sbh?= =?us-ascii?Q?NBkNXHx77OgjXt1KCbis98QzYzHxQ750ezhUlxDYuJa195vLTjg7bN/JuN9R?= =?us-ascii?Q?seExhsr1MUmRqaiZQ9YwYRMW4DGv+j6Zuz3T8Sv1MkYQ2J1RlxV4l+a5j4uK?= =?us-ascii?Q?dWfdx22ctIMUo2yozuDtVSfjEpYxV54QjWT0IlhuZ9VYp0p7nEGY4rK3fLn4?= =?us-ascii?Q?nRkgtPbAj4/BHm/lM+zEQZN+K3H/BaO0Ftf0IO234xa+o0wZcEdKWj6fHaG3?= =?us-ascii?Q?aYkA+fZMshpOrX5iEUA8iZ+F12XCos+01p06FLn4ERqQYaXC0kOil17ATBSz?= =?us-ascii?Q?LJfYFv+ojTeDl6BF4DeRU5BGXM0ZAwAj/UVfNqHJvS9p95nsn5ukypTQXvoT?= =?us-ascii?Q?4tPcSNjtIQNAmPwuEIrSFbkOUmKQeEgiZtNq+PbRyRp+uJrF9o2NiUDZ4WMm?= =?us-ascii?Q?6c5+L29jJv9sns+1M0cR+0Gr9dlkh6dTAl87E0EZJu57fE8z3mmQBFHWJJAs?= =?us-ascii?Q?LWueve8rdzWSe068tCJ0/hdL+xqWNuNUxtFPfuFFfA2/URDO+0ZWNWsv5icU?= =?us-ascii?Q?dBJrIjxKEef0+CjRicd4thPYJRa8r83snGWVaoqOr6ZZZYaXX6xV0XAQ+QOs?= =?us-ascii?Q?/JxV7QYfNga1LulPfzdQAKIQ/SStF+wKRaz8UwEAuHmC7v/BUIcsp1gKGNqy?= =?us-ascii?Q?3NNVe6M/gR72pEbaYOHQZF+lfewy+0gWXwIRw9uaFaXG13Q2/n1q6/9XWQng?= =?us-ascii?Q?XzMQii4nJi/qWGd/LBgNyVKxD6DTzupHQ/gwtBXH2EZXABvqWcHCs/WZlrsv?= =?us-ascii?Q?bdHzkrhcfc24neRQJZdK6qhNp4T95ktXr/oeaL+xqlkl3BoBFuceogkckhCL?= =?us-ascii?Q?uBZum6++uMbS5FOwpztbzed6AkHj+jats9q3AAsa2Ozj5H4iEUXSIR+Brn0p?= =?us-ascii?Q?U/V9Q4pjjR2DID4JMTxp33xldgx1wvdcHlU6lNAQGqfwFp5YH9M8obFZ56j1?= =?us-ascii?Q?VduZbyBx6hW6N1kdBDjZBQWTno87JyyH+DeKVuPEVVq0I/2ietibYHKU/5kg?= =?us-ascii?Q?bfFmTkUbHthtv2OHMXjKxpT31CP9kwWyL6xE/vuJBFA+2D02CnpNY+SMP6zw?= =?us-ascii?Q?h14jeC9Ad+4m9o/Hv0c9DiUoV+sUEAkOcetppw+cmdSU+naJ5old59Y7ByVT?= =?us-ascii?Q?6Kr6iJ9Nx7GfpQSfX3w6QY+J+Tv/afb5mnDW30XxfUZmarA6dWS9lI64uUXi?= =?us-ascii?Q?M938ESTYVxdFL/IhZ/44JJvrKL10D9uiwWsjmaZZan2cOXffafTSjTHHqAX7?= =?us-ascii?Q?Te3VgU3AKwj2Snh9oLspgKOUUyRN/A8F45L1L1rod5ELQZjrAot2un5v0QGN?= =?us-ascii?Q?fiRZiqh+wzawIa6Se10PSNyzckq28nQ6uQdaslOw?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB5872.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 12f7cc61-2aa2-41c7-5399-08dae22b2746 X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Dec 2022 01:40:19.6113 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: NdHAkgizSxsdSg2ETTNeDfk9gRlgWAmJJGW/TMX1RQl2q0cTJDiY6EQx3s2ZZHtmI5lOlWv7WwuVE5HS8m1o6g== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY5PR11MB6415 Return-Path: jiewen.yao@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Just merged - https://github.com/tianocore/edk2/pull/3796 > -----Original Message----- > From: Vang, Judah > Sent: Tuesday, December 20, 2022 8:44 AM > To: devel@edk2.groups.io; Vang, Judah > Cc: Yao, Jiewen ; Wang, Jian J > ; Xiaoyu Lu ; Jiang, Guomin > ; Mistry, Nishant C > Subject: RE: [edk2-devel] [PATCH v1 1/1] CryptoPkg: Need to enable crypto > functions >=20 > Hi Jiewen, >=20 > Has this patch been merged? > This is an important change for the UEFI Protected Variable feature. >=20 > Judah >=20 > -----Original Message----- > From: devel@edk2.groups.io On Behalf Of Judah > Vang > Sent: Monday, November 7, 2022 2:16 PM > To: devel@edk2.groups.io > Cc: Yao, Jiewen ; Wang, Jian J > ; Xiaoyu Lu ; Jiang, Guomin > ; Mistry, Nishant C > Subject: [edk2-devel] [PATCH v1 1/1] CryptoPkg: Need to enable crypto > functions >=20 > REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3992 >=20 > V1: Enable CryptAes for PEI phase. Enable CryptHkdf for SMM phase. > Update Readme.md >=20 > Cc: Jiewen Yao > Cc: Jian J Wang > Cc: Xiaoyu Lu > Cc: Guomin Jiang > Cc: Nishant C Mistry > Signed-off-by: Jian J Wang > Signed-off-by: Nishant C Mistry > Signed-off-by: Judah Vang > --- > CryptoPkg/Library/BaseCryptLib/PeiCryptLib.inf | 2 +- > CryptoPkg/Library/BaseCryptLib/SmmCryptLib.inf | 2 +- > CryptoPkg/Readme.md | 27 +++++++++++--------- > 3 files changed, 17 insertions(+), 14 deletions(-) >=20 > diff --git a/CryptoPkg/Library/BaseCryptLib/PeiCryptLib.inf > b/CryptoPkg/Library/BaseCryptLib/PeiCryptLib.inf > index b1629647f9c6..ee5f3cd5d4b6 100644 > --- a/CryptoPkg/Library/BaseCryptLib/PeiCryptLib.inf > +++ b/CryptoPkg/Library/BaseCryptLib/PeiCryptLib.inf > @@ -43,7 +43,7 @@ [Sources] > Hash/CryptParallelHashNull.c > Hmac/CryptHmac.c > Kdf/CryptHkdf.c > - Cipher/CryptAesNull.c > + Cipher/CryptAes.c > Cipher/CryptAeadAesGcmNull.c > Pk/CryptRsaBasic.c > Pk/CryptRsaExtNull.c > diff --git a/CryptoPkg/Library/BaseCryptLib/SmmCryptLib.inf > b/CryptoPkg/Library/BaseCryptLib/SmmCryptLib.inf > index 0af7a3f96e8f..cc5a53ca92cd 100644 > --- a/CryptoPkg/Library/BaseCryptLib/SmmCryptLib.inf > +++ b/CryptoPkg/Library/BaseCryptLib/SmmCryptLib.inf > @@ -43,7 +43,7 @@ [Sources] > Hash/CryptCShake256.c > Hash/CryptParallelHash.c > Hmac/CryptHmac.c > - Kdf/CryptHkdfNull.c > + Kdf/CryptHkdf.c > Cipher/CryptAes.c > Cipher/CryptAeadAesGcmNull.c > Pk/CryptRsaBasic.c > diff --git a/CryptoPkg/Readme.md b/CryptoPkg/Readme.md index > 067465b8eb7d..cb072db72397 100644 > --- a/CryptoPkg/Readme.md > +++ b/CryptoPkg/Readme.md > @@ -447,18 +447,20 @@ and CryptoSmm modules. > #### Common PEI PcdCryptoServiceFamilyEnable Settings >=20 > ``` > - > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.HmacSha256.F > amily | PCD_CRYPTO_SERVICE_ENABLE_FAMILY > - > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.HmacSha384.F > amily | PCD_CRYPTO_SERVICE_ENABLE_FAMILY > - gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Sha1.Family > | PCD_CRYPTO_SERVICE_ENABLE_FAMILY > - > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Sha256.Family > | PCD_CRYPTO_SERVICE_ENABLE_FAMILY > - > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Sha384.Family > | PCD_CRYPTO_SERVICE_ENABLE_FAMILY > - > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Sha512.Family > | PCD_CRYPTO_SERVICE_ENABLE_FAMILY > - gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Sm3.Family > | PCD_CRYPTO_SERVICE_ENABLE_FAMILY > - > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Rsa.Services.Pk > cs1Verify | TRUE > - > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Rsa.Services.N > ew | TRUE > - > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Rsa.Services.Fr > ee | TRUE > - > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Rsa.Services.Se > tKey | TRUE > - > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Pkcs.Services.P > kcs5HashPassword | TRUE > + > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.HmacSha256.F > amily | PCD_CRYPTO_SERVICE_ENABLE_FAMILY > + > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.HmacSha384.F > amily | PCD_CRYPTO_SERVICE_ENABLE_FAMILY > + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Sha1.Family > | PCD_CRYPTO_SERVICE_ENABLE_FAMILY > + > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Sha256.Family > | PCD_CRYPTO_SERVICE_ENABLE_FAMILY > + > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Sha384.Family > | PCD_CRYPTO_SERVICE_ENABLE_FAMILY > + > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Sha512.Family > | PCD_CRYPTO_SERVICE_ENABLE_FAMILY > + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Sm3.Family > | PCD_CRYPTO_SERVICE_ENABLE_FAMILY > + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Aes.Family > | PCD_CRYPTO_SERVICE_ENABLE_FAMILY > + > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Rsa.Services.Pk > cs1Verify | TRUE > + > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Rsa.Services.N > ew | TRUE > + > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Rsa.Services.Fr > ee | TRUE > + > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Rsa.Services.Se > tKey | TRUE > + > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Pkcs.Services.P > kcs5HashPassword | TRUE > + > + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Hkdf.Services > + .Sha256ExtractAndExpand | TRUE > ``` >=20 > #### Common DXE and SMM PcdCryptoServiceFamilyEnable Settings @@ - > 466,6 +468,7 @@ and CryptoSmm modules. > ``` >=20 > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.HmacSha256.F > amily | PCD_CRYPTO_SERVICE_ENABLE_FAMILY >=20 > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.HmacSha384.F > amily | PCD_CRYPTO_SERVICE_ENABLE_FAMILY > + gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Hkdf.Family > | PCD_CRYPTO_SERVICE_ENABLE_FAMILY >=20 > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Pkcs.Services.P > kcs1v2Encrypt | TRUE >=20 > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Pkcs.Services.P > kcs5HashPassword | TRUE >=20 > gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.Pkcs.Services.P > kcs7Verify | TRUE > -- > 2.35.1.windows.2 >=20 >=20 >=20 >=20 >=20