From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by mx.groups.io with SMTP id smtpd.web10.13650.1669104326987526765 for ; Tue, 22 Nov 2022 00:05:27 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=CCvHo+1l; spf=pass (domain: intel.com, ip: 192.55.52.88, mailfrom: jian.j.wang@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1669104326; x=1700640326; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=g8NC5UERKxTZ1E4IgLR7eTyhtKF4aZnewr9HHvmi9cE=; b=CCvHo+1lx8+8NS0MI8jWk5KlzX+BEKZa0ASqj7XMFDPv4QjsurCBEE9m pqCzxmLQyxHLC+oQAko6+WRpFaabmJpf7Cuf1EjSpkk9BJH8hDNIVc32z 7ZKshKGtcVnJtsKTjhO0v0uGE2aUoQLvr1aadQgpQATwEwkzY+pR6ZNYj pSxqXyhdnAr6xS4baRW/tDAvQ42Aq13FvhcbDTyMKmRT6mCmF22vktozy 8e4eWo51U6lcdWSXhRFG9QSemXKTkX88WX+tpuPly+TN1HEtUL9mM7IJN ag4gWq/9Ik0upF2ClJBpfpQRYWjG3yUGRrDCPr1vGYJpE8UnOJ0/11Bsn g==; X-IronPort-AV: E=McAfee;i="6500,9779,10538"; a="340627098" X-IronPort-AV: E=Sophos;i="5.96,183,1665471600"; d="scan'208";a="340627098" Received: from fmsmga006.fm.intel.com ([10.253.24.20]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Nov 2022 00:05:26 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10538"; a="886436449" X-IronPort-AV: E=Sophos;i="5.96,183,1665471600"; d="scan'208";a="886436449" Received: from orsmsx602.amr.corp.intel.com ([10.22.229.15]) by fmsmga006.fm.intel.com with ESMTP; 22 Nov 2022 00:05:26 -0800 Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX602.amr.corp.intel.com (10.22.229.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Tue, 22 Nov 2022 00:05:26 -0800 Received: from ORSEDG602.ED.cps.intel.com (10.7.248.7) by orsmsx610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31 via Frontend Transport; Tue, 22 Nov 2022 00:05:26 -0800 Received: from NAM11-DM6-obe.outbound.protection.outlook.com (104.47.57.173) by edgegateway.intel.com (134.134.137.103) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2375.31; Tue, 22 Nov 2022 00:05:25 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GTb9O4cRH2uyU4vFm98Vfq5DixgIkVYxVzeLqp2+u4f9WHsA+AKuCecnHAyIyEwAqYai7WNuiGnEtUJ0azBbj12+tlIj9OQ6KjITCXzsK2IBS7+lvlmu+kDeorfGd9DhCNfXRFvN1fpqRAZlaXTISEK9993X3AXKrq2ReeFxxCAhDQTGL3YeXqGdegU7gbjudVgpAaBAgcujphe0g+RD7Vw/fLveaC9TM/VFyGXIZ5vf7T609W465nHHUJLa7MS5p42dWUBIP6GEat+T/fcUmanxYGLlg5A3KX0IxG0JKGVQXIZCZqvv1O3f4WRiZnu/P0uQpeFpKf0Rjbn/tIkDgQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=BMHrNP3Afly5IRqSyhzmdUfHMHsUL64vJjBVSAZ7cko=; b=bAqAZUEAnla+YIDO1LXsKsNFwh0Ft/31y38+wzKDGBjHg9TnxbHyl7ZMAk9UmigSxwpCjP4kx8x03CZwg5L31gQfs2D2MBiKl1A16/ngPbNphFt3g8iD+d6vQcpMnc0QyrRGR609qN/yGfccEdepmXjJdYWbCYcFxoepo0cehb6az7GuApNm6SEg4cdY6F2s3EwqrmuEoTwwnXwvmvzDnGUyOjMesLPzhsKqh7HTGSLhRAtgRvqOuqmE9FYIQ2FoXrDhTayIuUVUIU/NiGfdZXhy/ITKmWtRitw6E76d7OThygrHzkPqZtTRba2joLYy0PGFpQbcOCDgCD5ijRsemQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from MW4PR11MB6763.namprd11.prod.outlook.com (2603:10b6:303:20b::7) by CY5PR11MB6282.namprd11.prod.outlook.com (2603:10b6:930:22::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5834.9; Tue, 22 Nov 2022 08:05:24 +0000 Received: from MW4PR11MB6763.namprd11.prod.outlook.com ([fe80::1440:650:6a28:88d9]) by MW4PR11MB6763.namprd11.prod.outlook.com ([fe80::1440:650:6a28:88d9%4]) with mapi id 15.20.5834.015; Tue, 22 Nov 2022 08:05:24 +0000 From: "Wang, Jian J" To: "Vang, Judah" , "devel@edk2.groups.io" CC: "Yao, Jiewen" , "Mistry, Nishant C" Subject: Re: [PATCH v5 19/19] SecurityPkg: Add references to new *.inf files Thread-Topic: [PATCH v5 19/19] SecurityPkg: Add references to new *.inf files Thread-Index: AQHY8bJf06hv2cNsNEagEADU1eIAja5Krutg Date: Tue, 22 Nov 2022 08:05:24 +0000 Message-ID: References: <20221106073509.3071-1-judah.vang@intel.com> <20221106073509.3071-20-judah.vang@intel.com> In-Reply-To: <20221106073509.3071-20-judah.vang@intel.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MW4PR11MB6763:EE_|CY5PR11MB6282:EE_ x-ms-office365-filtering-correlation-id: 5221cbe2-6a2b-4f7a-368f-08dacc604f49 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MW4PR11MB6763.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230022)(376002)(366004)(396003)(136003)(346002)(39860400002)(451199015)(33656002)(38100700002)(82960400001)(83380400001)(66946007)(15650500001)(4326008)(8676002)(55016003)(8936002)(66476007)(64756008)(66446008)(2906002)(5660300002)(52536014)(54906003)(316002)(186003)(110136005)(66556008)(76116006)(122000001)(71200400001)(9686003)(53546011)(107886003)(86362001)(7696005)(478600001)(38070700005)(6506007)(966005)(26005)(41300700001);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?zysUD3fL3hOr5DJi7126jvj6X85WuM3DHAPfMtkp4nsxX/mv6NUFkqdwnq3+?= =?us-ascii?Q?jOJdEX9aiRg3Q9Lg6pNEuD/spQ5SVxwLxCRR1v+HfaZke+JWhr273HYfwsrK?= =?us-ascii?Q?tYwksJ9qhHYVqHngkqQ3E+vklNj1rwl92pfhlMjiwVRYi1+6+R1R6s9dwLtY?= =?us-ascii?Q?yUTFjTshT5FkAJD19ZjingJoKqrTl1zvLPpN5IbaLwDUKcv6k/abgG5/cDhd?= =?us-ascii?Q?3GLj+aISOsD3Fgi1r5DJ/zU4fEb4tAz1TuVpSY6gOj6zWSmSeyZDBhCXkqO9?= =?us-ascii?Q?aab8raDvpOyQ18J688LD5SFY3DfkMHtOac60pHzDwPVHzfix0HmnxWbSTsUW?= =?us-ascii?Q?3rbX84OGjJpobz7HcojQVIQlaY7co8IogEGdCdw7WeW10C4fr7qAtVHetNXs?= =?us-ascii?Q?pK8n9mJDWsGL17LnZ038AYZxTKu+Zw7XsrJHl6dPynIsNfj+cnbkcFvYFPWG?= =?us-ascii?Q?jBdwqrVe5U+mOgbUbC04BT1fZ/Cg/FNkabd2HrROf8zmxCd//dLzQwM5HVDt?= =?us-ascii?Q?PAyENR3EknymJuVxXqFHZtTICyOWoRIuwZNTddzp4Cdj2dI64/VmMJe2Ryw1?= =?us-ascii?Q?Nck4BssW/y+QCP5jI9nNmyKqtAv5pmBp+E0aUs149L0kLCsVSsRoVrz12eAX?= =?us-ascii?Q?y5PCtTR3W+SshHIq31HWcxcVUFbCAkv92zIFE3hOX5jCfJZLBQPSEFJVZHov?= =?us-ascii?Q?eFV84NxATYtCO45xMcmc0+5Ke67IajvItck6UBG/VPT9BzQcWLBxkdMsvvtW?= =?us-ascii?Q?xrzGFJ4A00h7vJe4gEWfMA6W/fjgvO+NFfPzRoWYANql+QcagStyBu5+G9Uu?= =?us-ascii?Q?czKZAnrrlUyW8ppaZH9lLiSPphlz+Jm9tEFlXJVo2NsWyuuNtZa0Kd9Snb8y?= =?us-ascii?Q?i/CrA3i7RMDwbYSBQ5ZMIb2wOTFAC05fidXkSP3upXrvboI2szAw5E0NLeth?= =?us-ascii?Q?Jr+64q7DPJem/aYNqCOSggL5Kf0P23dAGqW8SiUTXWuCdClwtZrNYFxsHcwz?= =?us-ascii?Q?ORuCFDrVx8jZ+MDEEU0JWaCK+LGW0usl16aCSvV3oipQ9mbrYgo6bgswoMa6?= =?us-ascii?Q?c6EynDnqbs8/kppR9f3ItIA7dfr6jwU1E1fwiknYTLM9UqstKj9t/Ezu3Z/t?= =?us-ascii?Q?noGxOxfnSJnG/bNJlHUEiqSN3LIrzN7J4IQTxMc2ulVypRWCw5S7riv+kSve?= =?us-ascii?Q?cHUz3Ovj3iuBuRcpW7JH7gDsrOpp66M565k0DXrq9VqMOK3xKxptldP384Ov?= =?us-ascii?Q?8BM+qxro9xeGI9R0qJXbFzpM0CPlF2JxsBMYhsidkUXwgwFtcTJhnkoDB2hd?= =?us-ascii?Q?e2iOQwj1CNgJph4PnqNT5M5eTEsxdy2PqbXDUrkodozI+TKSsduC+moWl13k?= =?us-ascii?Q?NcweSqBBvHXTjAM9ZOYJ5Ktm8UfY5z8GcTaQ1/hhsGOSVwWoe/ApDiu8ryuB?= =?us-ascii?Q?AuMh6oFbxNtY4SADFC08KAANDJkWbCZH49B6j42ldT4waMMxCuZMtoAVlg/W?= =?us-ascii?Q?tZ1zDqRprNRCMGiW0OF69JJce7tAq69z9YYf5XsOAQeqZMj5f+GGWtyCjJf9?= =?us-ascii?Q?n36gkl77GmabaCVPmhMy4H1G9X7veSo1ABYUd3td?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB6763.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 5221cbe2-6a2b-4f7a-368f-08dacc604f49 X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Nov 2022 08:05:24.4846 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: s51ZBkTqCg5sWSxzl9DNx1b4Olk1ZnY4LICS5NC63TslJV3VF649Bi6dsYl167W2HGVqErFji+kNgsSYCBSlPg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY5PR11MB6282 Return-Path: jian.j.wang@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Reviewed-by: Jian J Wang Regards, Jian > -----Original Message----- > From: Vang, Judah > Sent: Sunday, November 06, 2022 3:35 PM > To: devel@edk2.groups.io > Cc: Wang, Jian J ; Yao, Jiewen ; > Mistry, Nishant C > Subject: [PATCH v5 19/19] SecurityPkg: Add references to new *.inf files >=20 > REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D2594 >=20 > Add references to the different *ProtectedVariableLib.inf. > Also add references to VariableKeyLibNull.inf, > EncryptionVariableLibNull.inf, ProtectedVariableNull.inf. >=20 > Cc: Jian J Wang > Cc: Jiewen Yao > Cc: Nishant C Mistry > Signed-off-by: Jian J Wang > Signed-off-by: Nishant C Mistry > Signed-off-by: Judah Vang > --- > SecurityPkg/SecurityPkg.dsc | 13 ++++++++++++- > 1 file changed, 12 insertions(+), 1 deletion(-) >=20 > diff --git a/SecurityPkg/SecurityPkg.dsc b/SecurityPkg/SecurityPkg.dsc > index 6bf53c565882..3134b103ff53 100644 > --- a/SecurityPkg/SecurityPkg.dsc > +++ b/SecurityPkg/SecurityPkg.dsc > @@ -1,7 +1,7 @@ > ## @file > # Security Module Package for All Architectures. > # > -# Copyright (c) 2009 - 2021, Intel Corporation. All rights reserved.
> +# Copyright (c) 2009 - 2022, Intel Corporation. All rights reserved.
> # (C) Copyright 2015-2020 Hewlett Packard Enterprise Development LP
> # Copyright (c) 2022, Loongson Technology Corporation Limited. All right= s > reserved.
> # SPDX-License-Identifier: BSD-2-Clause-Patent > @@ -67,8 +67,11 @@ [LibraryClasses] >=20 > TcgStorageCoreLib|SecurityPkg/Library/TcgStorageCoreLib/TcgStorageCoreLib= . > inf >=20 > TcgStorageOpalLib|SecurityPkg/Library/TcgStorageOpalLib/TcgStorageOpalLib= .i > nf >=20 > ResetSystemLib|MdeModulePkg/Library/BaseResetSystemLibNull/BaseResetSys > temLibNull.inf > + > + # These should be Null by default > VariableKeyLib|SecurityPkg/Library/VariableKeyLibNull/VariableKeyLibNu= ll.inf > RpmcLib|SecurityPkg/Library/RpmcLibNull/RpmcLibNull.inf > + > EncryptionVariableLib|SecurityPkg/Library/EncryptionVariableLibNull/Encry= ption > VariableLibNull.inf >=20 > TcgEventLogRecordLib|SecurityPkg/Library/TcgEventLogRecordLib/TcgEventLo > gRecordLib.inf >=20 > MmUnblockMemoryLib|MdePkg/Library/MmUnblockMemoryLib/MmUnblockM > emoryLibNull.inf >=20 > SecureBootVariableLib|SecurityPkg/Library/SecureBootVariableLib/SecureBoo= t > VariableLib.inf > @@ -261,9 +264,17 @@ [Components] > # > # Variable Confidentiality & Integrity > # > + SecurityPkg/Library/ProtectedVariableLib/PeiProtectedVariableLib.inf > + SecurityPkg/Library/ProtectedVariableLib/DxeProtectedVariableLib.inf > + SecurityPkg/Library/ProtectedVariableLib/SmmProtectedVariableLib.inf > + > SecurityPkg/Library/ProtectedVariableLib/SmmRuntimeProtectedVariableLib.i= nf > + SecurityPkg/Library/EncryptionVariableLib/EncryptionVariableLib.inf > + SecurityPkg/Library/VariableKeyLib/VariableKeyLib.inf > + > SecurityPkg/Library/VariableKeyLibNull/VariableKeyLibNull.inf > SecurityPkg/Library/RpmcLibNull/RpmcLibNull.inf >=20 > SecurityPkg/Library/PlatformPKProtectionLibVarPolicy/PlatformPKProtection= Lib > VarPolicy.inf > + SecurityPkg/Library/EncryptionVariableLibNull/EncryptionVariableLibNul= l.inf >=20 > # > # Other > -- > 2.35.1.windows.2