From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail05.groups.io (mail05.groups.io [45.79.224.7]) by spool.mail.gandi.net (Postfix) with ESMTPS id EDFFE78003C for ; Fri, 26 Apr 2024 01:52:04 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=xm9LqF61qLzc8uFOhVOi/5R8bee+V3cCt0/HNnj81ww=; c=relaxed/simple; d=groups.io; h=From:To:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Resent-Date:Resent-From:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding; s=20240206; t=1714096323; v=1; b=JqgBT+S7AB3kMcjfZWXkybgBdD/viX/8Bx0frJUGM0eeGqQ6dyDkFOu5Uv07SUzKJbJLOK48 Eqwut3aCj+kAEr9GsBkUvlkoqG1S64aYs6/sZhayx+9XOLoUQbp/avu9sF6ZRdloaZLURR23T+S Fqd5nkbDUvbDNCoyfThT/UGqFkM4LKgT1TTrsvRuU9bNgFdac7JohmOwwmAXADbfAtVBviB7yUt MNW4n/0KN+8VGytjkGvjkH/iayR8uaiXKFMDFnixOQfgaXvAl+qU1IR6JbTGAJNnMsTPPkVw+xn b9aT8Eoder9m/sxlc8naDvC7dRXpAHKdzOiK1JfoaCcWw== X-Received: by 127.0.0.2 with SMTP id 9xl9YY7687511xK7XGe9Qqze; Thu, 25 Apr 2024 18:52:03 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.15]) by mx.groups.io with SMTP id smtpd.web10.4166.1714096322342210150 for ; Thu, 25 Apr 2024 18:52:02 -0700 X-CSE-ConnectionGUID: Sil3C+auQay/4cShTn1/PA== X-CSE-MsgGUID: 664aFXGhSNGWGNzhWx4ydw== X-IronPort-AV: E=McAfee;i="6600,9927,11055"; a="13602167" X-IronPort-AV: E=Sophos;i="6.07,231,1708416000"; d="scan'208";a="13602167" X-Received: from orviesa006.jf.intel.com ([10.64.159.146]) by orvoesa107.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 25 Apr 2024 18:52:02 -0700 X-CSE-ConnectionGUID: V7T+V6O8TmWIbbba6PHBjw== X-CSE-MsgGUID: BJBhRHBMT7S5TZ5gUwZGeQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.07,231,1708416000"; d="scan'208";a="25683822" X-Received: from orsmsx602.amr.corp.intel.com ([10.22.229.15]) by orviesa006.jf.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 25 Apr 2024 18:52:02 -0700 X-Received: from orsmsx611.amr.corp.intel.com (10.22.229.24) by ORSMSX602.amr.corp.intel.com (10.22.229.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Thu, 25 Apr 2024 18:52:01 -0700 X-Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX611.amr.corp.intel.com (10.22.229.24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Thu, 25 Apr 2024 18:52:00 -0700 X-Received: from orsedg603.ED.cps.intel.com (10.7.248.4) by orsmsx610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35 via Frontend Transport; Thu, 25 Apr 2024 18:52:00 -0700 X-Received: from NAM11-BN8-obe.outbound.protection.outlook.com (104.47.58.171) by edgegateway.intel.com (134.134.137.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Thu, 25 Apr 2024 18:52:00 -0700 X-Received: from PH0PR11MB5046.namprd11.prod.outlook.com (2603:10b6:510:3b::20) by DS7PR11MB6014.namprd11.prod.outlook.com (2603:10b6:8:73::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7519.22; Fri, 26 Apr 2024 01:51:52 +0000 X-Received: from PH0PR11MB5046.namprd11.prod.outlook.com ([fe80::c253:f1ee:bfd7:6991]) by PH0PR11MB5046.namprd11.prod.outlook.com ([fe80::c253:f1ee:bfd7:6991%6]) with mapi id 15.20.7519.021; Fri, 26 Apr 2024 01:51:52 +0000 From: "Wenxing Hou" To: "Yao, Jiewen" , "devel@edk2.groups.io" , Andrew Fish , Leif Lindholm , "Kinney, Michael D" , Liming Gao , "Sean Brogan" , Joey Vagedes , "Liu, Zhiguang" , "Kumar, Rahul R" Subject: Re: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature based on PFP 1.06 spec Thread-Topic: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature based on PFP 1.06 spec Thread-Index: AQHakXaHvTHf67uoDEuNoXqn/wKphrFty3SQgAQ5EBCABXI38A== Date: Fri, 26 Apr 2024 01:51:52 +0000 Message-ID: References: <17C755C8DBF259BF.15491@groups.io> In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PH0PR11MB5046:EE_|DS7PR11MB6014:EE_ x-ms-office365-filtering-correlation-id: d9135764-466e-4bb5-458f-08dc659371b8 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: =?us-ascii?Q?gyPDDbMRfkR1hKlRTeBjKggVa77f6jxpHLzq1bDymfbKtamcf0LXCo7zbcs3?= =?us-ascii?Q?Ex/XdJS9ugvpBZ9o6C/nOK7JaPCKYlgxz0sxmW8kbvvPR457zblsCb3eI/Tk?= =?us-ascii?Q?62jgh5fpSHSSHpUGhG/lNQLLKcgvAhO5T2/iIO1VOcWf3LJAYPOtWo8l/yVA?= =?us-ascii?Q?EOEwTFm4uBLzyJ37tVNXUsCQ6gLH3zpdc6YcbYXc9XyFcCf9+HtH0OZPIo36?= =?us-ascii?Q?cwIbFaH8ISNut6YCAt8+Z76igCw1Wf0293gPHrOH0TtY9wrQEjPc4ADZ+nvg?= =?us-ascii?Q?jNXRg4kOuzwVUSvc0coDtYiOT8ta/PYb7VDdTyBSn8C9G6AVnDxZKS4tRYXl?= =?us-ascii?Q?yrChdP7eJdN5SbMSxiOnWWhVu+0Hwr7MzfCc/taLMz4nk2IFuirRCiLn4iIa?= =?us-ascii?Q?AOn7m35ikjp6B1uXu1iUL7Q/KsMp30kfgSnVbGuFjbC/zGcOUKe7J1Wb1yec?= =?us-ascii?Q?Azvm8ZYxtE8mfixaKVjnc68FyMl+WD5MNJqyc7zulYISjNXtCPV+FVk8BJaY?= =?us-ascii?Q?CStlMG3oPgXvSQEollv/wi9JjmOwpDZcP0y309XDwzR12PFb9BvK9Edinb9R?= =?us-ascii?Q?So2hPi93nyYfp4xtdlSN3XpRbkHxBdJ8U2vtHXnQxuqV2QowUaroooDk23ye?= =?us-ascii?Q?SgreNMsvHARrfb4mFuzqIcczmKTePDQZsMw2+NbBZ2e8IeqA3eF3OEWiKow8?= =?us-ascii?Q?ynN/DE6ex7k7BQN3Uarl7R5Y1FOmOboujlbD+34S3m17xrMxyDGSl0EjL8MX?= =?us-ascii?Q?7oErhBzsjZb6D0ORnrcS7Vy5eHffoAOme0YKmoQ8CGliF/bL3lbO8xKb4ee0?= =?us-ascii?Q?MjFe+XLtRal1gnYL2qnr17nrtEEXaPiOfjIIE2VE0LjT/tQtG5A1beFyrTed?= =?us-ascii?Q?F9tstVpFcmIaeaUSDspIwiur2X2cq4kpzpl3g8MuBqdQQSRkHZDv5Ce0pEhq?= =?us-ascii?Q?4QwyGVnOut/M6PjbWefrOT30MwEyDbVvH9jju5cmR34JIh+ym7b+rq6JCNc6?= =?us-ascii?Q?TJToMjGi4hffgubZEQR75tOGz/DoO9JMp0WDlwls4XZ+9Id45zPEHq2LcHyq?= =?us-ascii?Q?bJR2hwoqfosovT+toUzZubl4QAVneCG4pENO+ZtGnXjW3A5Ffi8CXAeeMGYz?= =?us-ascii?Q?eafKIW77jAGzjBGvHxTnvNRQcdcHq2LnWmagbjGFf/kGKQV2o2lQjNl26CVm?= =?us-ascii?Q?AcxPBceoRQsStOJ0ymkSdRkiomnXnPmCsyywLK4ZsKtOvwhhMQwqDkUBjXcM?= =?us-ascii?Q?ajCisIdA3PRPsjbLP1mOqG0dZ1lij5+ZT1nizneexXQ+cvDQ+ImBa+Hw1s7j?= =?us-ascii?Q?+2TTI9VcbWPcJLemcIWoEUcg?= x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?hGwrAPOqaUuvtNhIXDP1SCr0/w/CnSWf5wJ4uJF6qpDszeQNwY0mKl0jAfLe?= =?us-ascii?Q?euavzOrg09rk9QSv0/+3tMQ33NASf/To/oBrW1elB5dwrzkpv932sKlz2nTG?= =?us-ascii?Q?O6zKjSw2YKb+SvKjiSF09lUhS5/dWb6JjwNqSAZV3iOM2tvX97kafcRp+D+d?= =?us-ascii?Q?yQAXUev2Mn5otXdUfJeoiLVdI9xPCb4o1SFFK0gUIp3hKzpUIZKfP7YOrAVs?= =?us-ascii?Q?hEY3TallnTAeE5siGvfeZHypScPD9ac71sm5e4BW1OMGWC85Md4GA/M6pdRv?= =?us-ascii?Q?UFEA8BQag7uI3/ZqOo4q6Oe5yK1uZmdVZavEyztNCKbvSJAadUyLzS4SBRgI?= =?us-ascii?Q?cELz2IbKdjFfHpSLJgpljzcXDkgjejsNo5zpRnrbRl/zxM9VAWmYBLCixs7S?= =?us-ascii?Q?Wu1rA8Z+ggO5Doy+QKMtRU4zPDLTEyRtXepF5JfHDFsUMsJzQFPIBrdC3mOG?= =?us-ascii?Q?y7O+HqsC81YPmPiZ11iOXbZLlNV4ftM98jAlXJiOOoHjX0qWaJ/DVAoVYN8x?= =?us-ascii?Q?/6C4ypBNjfrbnRuSke/DRL0RyLkriStWEqgzizwfnb87vlgyGJrA8cU22+SC?= =?us-ascii?Q?xu61knMkp5YSwmq4b3m0O2byUKYsTnnUA1fs0aZUBJFK4hZiQWq530+yNkdg?= =?us-ascii?Q?NIagWyw0pIbSzuul8U266KvFbCkqT+gi+8sqsnDpItBS3UhtVbXgL9jifi2u?= =?us-ascii?Q?p+CfrqYy/oKrJAKwEloGBmG1Fodm+9n20PBCtOzt5Xjz9YOKmBSIC8xdOlXB?= =?us-ascii?Q?ilhLgJo+0aQyubO6xcSi3Iubowi6bubPEyoms3jnAUohD8t0p5zRHPkj5A4T?= =?us-ascii?Q?KagmjidUD0VIBxA4/AV/h4V7LY9MsDZQaOA3xkkr3LkGfE8Xm4bFlshlOpOA?= =?us-ascii?Q?KKL4XKau/VxX/J4REkgqQAmFnVq46R7fYh53Ik7q6voVsZdp1vqv5MmbQcAV?= =?us-ascii?Q?0W176G62WlfsVnp7WycQkZ6d44TVczgcbivH9bF1NjEs9LQ09lxLHLjBsEuU?= =?us-ascii?Q?Ru/tJMTosl7Wd7g39SrrhpjMjNPa/QRi4zPPNwYiB3kg1OMMRm/idtHzuo+l?= =?us-ascii?Q?skLz4Q2G3NoPIF4wYxT4JkIz/bcEfSlnvruQbzx20mHOobPjzCJdbB3d/IMw?= =?us-ascii?Q?8owJuRFEFl4StQyugArL6wQEex18bIWtYK+OX9YHCBnxA3y/uGzK8tn6jfwJ?= =?us-ascii?Q?l5mbRZN2+Klay+t/9NKXw7KsvH+SIWlPZ2hjzAfcuKpAhcIcQiaxUuO98AcG?= =?us-ascii?Q?ID+m+v10ZMMF/TuwFlrqjqyyV9BaalB9gIcaGRIjjXfQX9/GWz6WVPtPoA4/?= =?us-ascii?Q?TTUuHpvTe6vGjcnEAH0OpoyQjUs0ila0i3C52dGGCXb9GIY13+X6Vp6AfL+J?= =?us-ascii?Q?HAh4/x1M9CMS+IhY6hO+z9ueL2cjRlcy2cErH1aNiVDsp88NfjTg/P6OBQ2N?= =?us-ascii?Q?M/+xAleQzzdBYwMvishNlyzVjQQZp/JvI33HuY1Fv4cHLJTNP6vr6fg9dh4Y?= =?us-ascii?Q?WFS9iz4sTU/o6Psp2wczcqaP+IBF9c8rAuHz6/3/QmVDVEBPnZ8KkFAZUh6n?= =?us-ascii?Q?kbm/hDL1nufmANn2TIzXr71OJDUQb8mR58xsK+Yv?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB5046.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: d9135764-466e-4bb5-458f-08dc659371b8 X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Apr 2024 01:51:52.2220 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 0d+lI5h0gUWNrRodevByfvy++PAhyusJRW4+C3zwLIBd7C6mpZlPMNMiMVCBQLEQ6GGi2Ihgh6Csw69Ph7bKdQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR11MB6014 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Resent-Date: Thu, 25 Apr 2024 18:52:02 -0700 Resent-From: wenxing.hou@intel.com Reply-To: devel@edk2.groups.io,wenxing.hou@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: q274mY5bNabeYGxapQGLvnVwx7686176AA= Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20240206 header.b=JqgBT+S7; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 45.79.224.7 as permitted sender) smtp.mailfrom=bounce@groups.io Hi EDKII stewards, Could you please review the libspdm license? The libspdm(https://github.com/DMTF/libspdm) is a implementation that follo= ws the DMTF SPDM(https://www.dmtf.org/standards/spdm) spec. And the libspdm library is under DMTF repo. The license is: https://github.com/DMTF/libspdm/blob/main/LICENSE.md Thanks, Wenxing -----Original Message----- From: Yao, Jiewen =20 Sent: Sunday, April 21, 2024 10:31 AM To: Hou, Wenxing ; devel@edk2.groups.io; Andrew Fish= ; Leif Lindholm ; Kinney, Mich= ael D ; Liming Gao ; = Sean Brogan ; Joey Vagedes ; Liu, Zhiguang ; Kumar, Rahul R Subject: RE: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature based= on PFP 1.06 spec All series: Reviewed-by: Jiewen Yao Dear Steward member Do you have any concern on adding libspdm (https://github.com/DMTF/libspdm)= as one more submodule? Thank you Yao, Jiewen > -----Original Message----- > From: Hou, Wenxing > Sent: Thursday, April 18, 2024 6:16 PM > To: devel@edk2.groups.io; Andrew Fish ; Leif Lindholm=20 > ; Kinney, Michael D=20 > ; Liming Gao ;=20 > Sean Brogan ; Joey Vagedes=20 > ; Liu, Zhiguang ;=20 > Kumar, Rahul R ; Yao, Jiewen=20 > > Subject: RE: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature=20 > based on PFP 1.06 spec >=20 > Dear EDKII reviewers: >=20 > Thank you for your previous review of this patch set. > Currently, five patches have been reviewed by. >=20 > But there are five patches need review. > Patch1: MdePkg: Add SPDM1.2 support. > Patch2: MdePkg: Add TCG PFP 1.06 support. > Patch4: MdeModulePkg/Variable: Add TCG SPDM device measurement=20 > update > Patch8: .gitmodule: Add libspdm submodule for EDKII > Patch10: ReadMe.rst: Add libspdm submodule license >=20 > Could you please review the PATCH v4? >=20 > PS: Jiewen has reviewed all the PATCH. And I have fixed his feedback in P= ATCH v4. > Jiewen has no questions about all the patches anymore. >=20 > Thanks, > Wenxing >=20 >=20 > -----Original Message----- > From: devel@edk2.groups.io On Behalf Of Wenxing=20 > Hou > Sent: Thursday, April 18, 2024 5:28 PM > To: devel@edk2.groups.io > Cc: Andrew Fish ; Leif Lindholm=20 > ; Kinney, Michael D=20 > ; Liming Gao ;=20 > Sean Brogan ; Joey Vagedes=20 > ; Liu, Zhiguang ;=20 > Kumar, Rahul R ; Yao, Jiewen=20 > > Subject: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature=20 > based on PFP > 1.06 spec >=20 > REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D2479 >=20 > In PFP spec 1.06, platform firmware records the device certificate and=20 > device measurement for each SPDM responder. > This PATCH set implement the DeviceSecurityLib to support spdm device=20 > Authentication and Measurement. >=20 > Libspdm as submodule is to support DeviceSecurity feature: > https://github.com/DMTF/libspdm >=20 > TCG PFP spec 1.06: > https://trustedcomputinggroup.org/resource/pc-client-specific-platform > - > firmware-profile-specification/ >=20 > The POC branch: > https://github.com/tianocore/edk2-staging/tree/DeviceSecurity >=20 > And the PATCH set has passed the EDKII CI: > https://github.com/tianocore/edk2/pull/5508 >=20 > v2 changes: > - Fix typo: PcdEnableSpdmDeviceAuthenticaion ->=20 > PcdEnableSpdmDeviceAuthentication > v3 changes: > - Add new patch 10: Update ReadMe.rst for libspdm submodule license > v4 changes: > - Update submodule libspdm to latest tag >=20 > PATCH 3: Reviewed-by: Liming Gao PATCH 5: > Reviewed-by: Jiewen Yao PATCH 6: Reviewed-by: > Jiewen Yao PATCH 7: Reviewed-by: Joey Vagedes=20 > PATCH 9: Reviewed-by: Jiewen Yao=20 > >=20 > Cc: Andrew Fish > Cc: Leif Lindholm > Cc: Michael D Kinney > Cc: Liming Gao > Cc: Sean Brogan > Cc: Joey Vagedes > Cc: Zhiguang Liu > Cc: Rahul Kumar > Cc: Jiewen Yao > Signed-off-by: Wenxing Hou >=20 > Wenxing Hou (10): > MdePkg: Add SPDM1.2 support. > MdePkg: Add TCG PFP 1.06 support. > MdePkg: Add devAuthBoot GlobalVariable > MdeModulePkg/Variable: Add TCG SPDM device measurement update > SecurityPkg: Add TCG PFP 1.06 support. > SecurityPkg: add DeviceSecurity support > .pytool/CISettings.py: add libspdm submodule. > .gitmodule: Add libspdm submodule for EDKII > SecurityPkg: Add libspdm submodule > ReadMe.rst: Add libspdm submodule license >=20 > .gitmodules | 3 + > .pytool/CISettings.py | 2 + > MdeModulePkg/MdeModulePkg.dec | 5 + > .../Variable/RuntimeDxe/Measurement.c | 38 +- > .../RuntimeDxe/VariableRuntimeDxe.inf | 3 + > .../RuntimeDxe/VariableSmmRuntimeDxe.inf | 3 + > MdePkg/Include/Guid/GlobalVariable.h | 8 +- > MdePkg/Include/Guid/ImageAuthentication.h | 5 +- > MdePkg/Include/IndustryStandard/Spdm.h | 1112 ++++++++++++++++- > .../IndustryStandard/UefiTcgPlatform.h | 186 ++- > ReadMe.rst | 1 + > .../OsStub/CryptlibWrapper/CryptlibWrapper.c | 970 ++++++++++++++ > .../CryptlibWrapper/CryptlibWrapper.inf | 38 + > .../OsStub/MemLibWrapper/MemLibWrapper.c | 177 +++ > .../OsStub/MemLibWrapper/MemLibWrapper.inf | 33 + > .../PlatformLibWrapper/PlatformLibWrapper.c | 85 ++ > .../PlatformLibWrapper/PlatformLibWrapper.inf | 33 + > .../SpdmLib/Include/Stub/SpdmLibStub.h | 347 +++++ > .../SpdmLib/Include/hal/LibspdmStdBoolAlt.h | 23 + > .../SpdmLib/Include/hal/LibspdmStdDefAlt.h | 16 + > .../SpdmLib/Include/hal/LibspdmStdIntAlt.h | 25 + > .../DeviceSecurity/SpdmLib/Include/hal/base.h | 94 ++ > .../SpdmLib/Include/hal/library/debuglib.h | 39 + > .../SpdmLib/Include/library/spdm_lib_config.h | 394 ++++++ > .../DeviceSecurity/SpdmLib/SpdmCommonLib.inf | 47 + > .../DeviceSecurity/SpdmLib/SpdmCryptLib.inf | 45 + > .../SpdmLib/SpdmDeviceSecretLibNull.inf | 36 + > .../SpdmLib/SpdmRequesterLib.inf | 59 + > .../SpdmLib/SpdmResponderLib.inf | 61 + > .../SpdmLib/SpdmSecuredMessageLib.inf | 44 + > .../SpdmLib/SpdmTransportMctpLib.inf | 38 + > .../SpdmLib/SpdmTransportPciDoeLib.inf | 38 + > SecurityPkg/DeviceSecurity/SpdmLib/libspdm | 1 + > .../SpdmSecurityLib/SpdmAuthentication.c | 697 +++++++++++ > .../SpdmSecurityLib/SpdmConnectionInit.c | 481 +++++++ > .../SpdmSecurityLib/SpdmMeasurement.c | 714 +++++++++++ > .../SpdmSecurityLib/SpdmSecurityLib.c | 148 +++ > .../SpdmSecurityLib/SpdmSecurityLib.inf | 54 + > .../SpdmSecurityLib/SpdmSecurityLibInternal.h | 250 ++++=20 > SecurityPkg/Include/Library/SpdmSecurityLib.h | 437 +++++++ > SecurityPkg/Include/Library/Tpm2CommandLib.h | 23 +- > .../Include/Protocol/DeviceSecurityPolicy.h | 133 ++ > .../HashLibBaseCryptoRouterDxe.c | 88 +- > .../Library/Tpm2CommandLib/Tpm2NVStorage.c | 122 +- > SecurityPkg/SecurityPkg.ci.yaml | 17 +- > SecurityPkg/SecurityPkg.dec | 13 +- > SecurityPkg/SecurityPkg.dsc | 31 +- > SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.c | 61 +- > SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf | 4 +- > 49 files changed, 7197 insertions(+), 85 deletions(-) create mode=20 > 100644=20 > SecurityPkg/DeviceSecurity/OsStub/CryptlibWrapper/CryptlibWrapper.c > create mode 100644 > SecurityPkg/DeviceSecurity/OsStub/CryptlibWrapper/CryptlibWrapper.inf > create mode 100644 > SecurityPkg/DeviceSecurity/OsStub/MemLibWrapper/MemLibWrapper.c > create mode 100644 > SecurityPkg/DeviceSecurity/OsStub/MemLibWrapper/MemLibWrapper.inf > create mode 100644 > SecurityPkg/DeviceSecurity/OsStub/PlatformLibWrapper/PlatformLibWrappe > r.c > create mode 100644 > SecurityPkg/DeviceSecurity/OsStub/PlatformLibWrapper/PlatformLibWrappe > r.inf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/Include/Stub/SpdmLibStub.h > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdBoolAlt.h > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdDefAlt.h > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmStdIntAlt.h > create mode 100644=20 > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/base.h > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/library/debuglib.h > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/Include/library/spdm_lib_config.h > create mode 100644=20 > SecurityPkg/DeviceSecurity/SpdmLib/SpdmCommonLib.inf > create mode 100644=20 > SecurityPkg/DeviceSecurity/SpdmLib/SpdmCryptLib.inf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/SpdmDeviceSecretLibNull.inf > create mode 100644=20 > SecurityPkg/DeviceSecurity/SpdmLib/SpdmRequesterLib.inf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/SpdmResponderLib.inf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/SpdmSecuredMessageLib.inf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/SpdmTransportMctpLib.inf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmLib/SpdmTransportPciDoeLib.inf > create mode 160000 SecurityPkg/DeviceSecurity/SpdmLib/libspdm > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmAuthentication.c > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmConnectionInit.c > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmMeasurement.c > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLib.c > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLib.inf > create mode 100644 > SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurityLibInternal.h > create mode 100644 SecurityPkg/Include/Library/SpdmSecurityLib.h > create mode 100644=20 > SecurityPkg/Include/Protocol/DeviceSecurityPolicy.h >=20 > -- > 2.26.2.windows.1 >=20 >=20 >=20 >=20 >=20 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#118308): https://edk2.groups.io/g/devel/message/118308 Mute This Topic: https://groups.io/mt/105594737/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-