From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail05.groups.io (mail05.groups.io [45.79.224.7]) by spool.mail.gandi.net (Postfix) with ESMTPS id C2C7A74003E for ; Thu, 18 Apr 2024 10:15:58 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=A6lPvbbG6PRgt9jze3eA03Hnq8KSrwGWm72lt6qFyUU=; c=relaxed/simple; d=groups.io; h=From:To:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Resent-Date:Resent-From:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding; s=20240206; t=1713435357; v=1; b=DriohxlnhNxkkPjYaIZMe7ZV3/abTvJmptzODPnPlORoJfWw5a1xSkhxnQoK9jnPS/VcuAS0 eIH1GjRiX5fMILvKesmDdZn/kMkejbAoaGIq0vjy2qLWidtnTveEd0SkIfpmZSqCTm0Eu5wwqFW dNKjdm4Lhvzd1p0hrfQguaraBpKsrry+ZasPaJHOdzIquZLPvBOlJCY7CuS0yNUNwIsI2/Y3K07 NiIphl91mG10zNK6YLUosDv/Oh+Xi0gCrf9TPFf2oGrosvlqKswHU3npUBr1crTvFgRdkvU64qz CP5uYq3p22Abro96Xoxt2OH1Hr5OYaLcO7NGFj78WDe6Q== X-Received: by 127.0.0.2 with SMTP id QQ4bYY7687511xkLfd9XUrTU; Thu, 18 Apr 2024 03:15:57 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.9]) by mx.groups.io with SMTP id smtpd.web11.9322.1713435356503374150 for ; Thu, 18 Apr 2024 03:15:56 -0700 X-CSE-ConnectionGUID: 6BVyYVzCQ5qi2YmoeQC4vw== X-CSE-MsgGUID: Bvrt4BSkT+qEOEvYdVQPNg== X-IronPort-AV: E=McAfee;i="6600,9927,11047"; a="31454660" X-IronPort-AV: E=Sophos;i="6.07,211,1708416000"; d="scan'208";a="31454660" X-Received: from fmviesa004.fm.intel.com ([10.60.135.144]) by orvoesa101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Apr 2024 03:15:51 -0700 X-CSE-ConnectionGUID: Z2CPoLIVS3avmEAGCRl1+A== X-CSE-MsgGUID: e17CN/kTT5G6vNMqkBtaJg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.07,211,1708416000"; d="scan'208";a="27568485" X-Received: from fmsmsx601.amr.corp.intel.com ([10.18.126.81]) by fmviesa004.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 18 Apr 2024 03:15:50 -0700 X-Received: from fmsmsx611.amr.corp.intel.com (10.18.126.91) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Thu, 18 Apr 2024 03:15:49 -0700 X-Received: from fmsmsx603.amr.corp.intel.com (10.18.126.83) by fmsmsx611.amr.corp.intel.com (10.18.126.91) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Thu, 18 Apr 2024 03:15:49 -0700 X-Received: from fmsedg601.ED.cps.intel.com (10.1.192.135) by fmsmsx603.amr.corp.intel.com (10.18.126.83) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35 via Frontend Transport; Thu, 18 Apr 2024 03:15:49 -0700 X-Received: from NAM10-MW2-obe.outbound.protection.outlook.com (104.47.55.100) by edgegateway.intel.com (192.55.55.70) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Thu, 18 Apr 2024 03:15:48 -0700 X-Received: from PH0PR11MB5046.namprd11.prod.outlook.com (2603:10b6:510:3b::20) by MW4PR11MB6960.namprd11.prod.outlook.com (2603:10b6:303:226::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7472.29; Thu, 18 Apr 2024 10:15:43 +0000 X-Received: from PH0PR11MB5046.namprd11.prod.outlook.com ([fe80::c253:f1ee:bfd7:6991]) by PH0PR11MB5046.namprd11.prod.outlook.com ([fe80::c253:f1ee:bfd7:6991%6]) with mapi id 15.20.7472.037; Thu, 18 Apr 2024 10:15:40 +0000 From: "Wenxing Hou" To: "devel@edk2.groups.io" , Andrew Fish , Leif Lindholm , "Kinney, Michael D" , Liming Gao , Sean Brogan , "Joey Vagedes" , "Liu, Zhiguang" , "Kumar, Rahul R" , "Yao, Jiewen" Subject: Re: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature based on PFP 1.06 spec Thread-Topic: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature based on PFP 1.06 spec Thread-Index: AQHakXaHvTHf67uoDEuNoXqn/wKphrFty3SQ Date: Thu, 18 Apr 2024 10:15:40 +0000 Message-ID: References: <17C755C8DBF259BF.15491@groups.io> In-Reply-To: <17C755C8DBF259BF.15491@groups.io> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PH0PR11MB5046:EE_|MW4PR11MB6960:EE_ x-ms-office365-filtering-correlation-id: a83fcbe4-a5f2-45ea-8341-08dc5f907fa2 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: u5Hg3zPcpcO7ZKASgxtdDBdtBr8iE6golALVkflaURElD3F4t1Lw1gEYQtCNhRM5mvSd64NiuRdxDZFqhac8NBVyTWkImeBezTvN945ZER4WTKYO6xSncLbZAQgfFIH1LmfXX8PpYaTQLHTCcLW4wNevwiPEllz30YIRhzwj+CXVygLmAtZLRXggNhsZhz3ilVVSu6KSDAG1V3RYUgZgvTSOFJh/Kn9n2upTeXAdMku6Q4wFQsGBGa2KpGPM5whanH0Ue2HLJK3idB54zTG79AGYFwxvId1qDk19W2+8dtSdxT6JsxHK2xI7og9LFTK2igNzFRJRhaORateV0BAYNpdspkPN8Ivgcfv62coCNdwBWR6DOePjcqnc7WGX4NTLiIS2IlU9XH6CjuYnT+mXyMATCbo53DYqq50GqbTEltDt1IaMFFUQtaNz3fFqTrNh/pX67h7XisPGJa6TtUCsBQAp5zIZYd1ANOIWFUSSDaL+ZKVvp7f6uul0K7oLpI/JoG/YGsPgxoPPT5W3FP4JtEV5rcIS3aNDc55r6Tdqyy8gaXd2Q7dizGR3TeRmdmIzMlNp2dxJJlVav+kAA57tR0+erfxkbrPi+0zLNRbQf0LDgBuh3GIrokTR3KWCB2cICP/XTAyUI7afX9wNS+/twG07RYbF4/JIm7oWgrDh+cb/1GK+pUzqoxCVPfmBBkC9 x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?7hucTe9MKlbxr1klpn9IekYZtpQJSgM56iWv2UhEE/IrqlJqVlcXJ9cVi6cv?= =?us-ascii?Q?b9/wSKOSQDduJQGW6Cx5IGDMuRSHRS5DJsMu2XU3kxzKdhVKmq3Gnq199xHJ?= =?us-ascii?Q?O7fWTtdtIGX5+jr8uzXX/unuZtdScLLw76DUqftZ1zle6GP2Lx7HfMvQGIQz?= =?us-ascii?Q?dUH568FJ57it/Anjw8IZQXq4eUTKbQO7DVeWfaW+7VOnY3HbZIhGxwdaamwx?= =?us-ascii?Q?zhdWYW0tNuy9tPdD53YBGGRka75X2ufN1eXYLnDgFitMrli2WEQvQsdpyMRP?= =?us-ascii?Q?s2FKdbIywfamPXMs6bvoOSI9ZV/zsMGV4YBvhTIZDAgzPGUCZhxcQ02Kh845?= =?us-ascii?Q?qDGXDM2Ly4WYwiFZt45vmvoRFIwSsqWubGIIIUWs1FKlM8IS0IBgBqgu13ZT?= =?us-ascii?Q?7bjGtmioxHovQtbo+fi74cTSgt8nXWrG/i2jR27sQmoICDx3HXaFvs4LEuCi?= =?us-ascii?Q?R27eEgq9MiRlXVRkRhoddVKeqTBGxkxT8BArU7HAW4yjgNONiVVHqOI9JZBZ?= =?us-ascii?Q?kdYxdDBeG642nQ5w2ta4pZxYedMd6r7ZiBDwIQhm9UK4RwKx6Jh4VVASgH3Q?= =?us-ascii?Q?HK5eeonh9TdR6B7xpo76o2RpmWPo8VwaMlSvntgLTum5bDD8/s+rE4lg5af1?= =?us-ascii?Q?wNQi6rm2uUnO4RVQxQUDTKmmm8r2WGtQ/Z1PJPqi+GrnN+8lV+HWQQTRqMGq?= =?us-ascii?Q?DFp4EkcC+4B4eL6s+4BmRKNy3OOkWfff8/zKd0wGGx8Gw14M/3sh4KASN02S?= =?us-ascii?Q?mHoIJpgMt3fxekZcaPWcAhUcs1KNk6gB9FXUQV2qQBkddhEzEeQWbcgzT9Md?= =?us-ascii?Q?xeRrm+Cdh9tIDKsUYwPd3/jlldhc1UTbuPny9lyGS6NOp2kbVTXTKK9y3QkP?= =?us-ascii?Q?9U/yV9VrXm63EqMVe1l//gd08pSEbBl+44xbwTye3jRENrA1R+IxwER+30vc?= =?us-ascii?Q?r6kdr7AZidAfvWKS4Uz1OP/b46w4INRG5rWOUFgI/aDLBpRsNVA55K0kDXAw?= =?us-ascii?Q?+ouG5yW10NVgJ6q99SkMCHDKZ8c2T4Bmeiooxk8l8wnx/szb7aajJFEWPik7?= =?us-ascii?Q?FhEWmlZbZm2rOJWjKwOxnrtfQVygnqb5pmszs7cws9jTiMJd/2+YRUyhGySw?= =?us-ascii?Q?dCiusRBzYgYfEp9gssDZa+NBGwLYFz060MifmFlxLKXx8KFnVGmpnOV+moji?= =?us-ascii?Q?9KZ+DO277D3IHOaL5x37gSSLIzInr6MoW3l3CMR6Lypsnr6TQZZyqy5cqO7t?= =?us-ascii?Q?OUbY+2mMrjb/5GhTPuUAFXOcvPjoFxsc82A0VX6RonihIlLc2ccAp1mduzS2?= =?us-ascii?Q?FxvlsyncO/fjgZkMp9stC1EbCu16BQfMdo7ds3G/X9CysUS/QrHgkJz49hjl?= =?us-ascii?Q?HLbl/ICKT6yXzU7HiEk448pqqfTHRcScoSX/OCO6WvqKX8YvzLz5PhKVBgpZ?= =?us-ascii?Q?G6sRfi9O+I5vgwHzLn842iuNB8qg2wUK7Bw6nvInl4S1+y71N6kgL7MVMSlW?= =?us-ascii?Q?26Eq2oxCGbmMfM98A5rs12yXntkoe25ZSQ3gRbSGpZ+4ZEumSvVIpi6IKWFJ?= =?us-ascii?Q?VR++PwwErqSABdyI75C7GK4Hwp4a+qj8FW+st48w?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB5046.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: a83fcbe4-a5f2-45ea-8341-08dc5f907fa2 X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Apr 2024 10:15:40.0661 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: FpYQQjfveVyQUX2vhJUBd6aVWOEkZFbItvKYVGrTZXRgRFR4H8vAEL5SL/0N6lIJ8DKIe3DyylIBS18RTLvnJQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW4PR11MB6960 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Resent-Date: Thu, 18 Apr 2024 03:15:56 -0700 Resent-From: wenxing.hou@intel.com Reply-To: devel@edk2.groups.io,wenxing.hou@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: tzoGsERnaPt43EObh19KZYG2x7686176AA= Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20240206 header.b=Driohxln; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 45.79.224.7 as permitted sender) smtp.mailfrom=bounce@groups.io Dear EDKII reviewers: Thank you for your previous review of this patch set. Currently, five patches have been reviewed by.=20 But there are five patches need review. Patch1: MdePkg: Add SPDM1.2 support. Patch2: MdePkg: Add TCG PFP 1.06 support. Patch4: MdeModulePkg/Variable: Add TCG SPDM device measurement update Patch8: .gitmodule: Add libspdm submodule for EDKII Patch10: ReadMe.rst: Add libspdm submodule license Could you please review the PATCH v4? PS: Jiewen has reviewed all the PATCH. And I have fixed his feedback in PAT= CH v4. Jiewen has no questions about all the patches anymore. Thanks, Wenxing -----Original Message----- From: devel@edk2.groups.io On Behalf Of Wenxing Hou Sent: Thursday, April 18, 2024 5:28 PM To: devel@edk2.groups.io Cc: Andrew Fish ; Leif Lindholm ; Kinney, Michael D ; Liming Gao ; Sean Brogan ; Joey Vagedes ; Liu, Zhiguang ; Kumar, Rahul R = ; Yao, Jiewen Subject: [edk2-devel] [PATCH v4 00/10] Add DeviceSecurity feature based on = PFP 1.06 spec REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D2479 In PFP spec 1.06, platform firmware records the device certificate and devi= ce measurement for each SPDM responder. This PATCH set implement the DeviceSecurityLib to support spdm device Authe= ntication and Measurement. Libspdm as submodule is to support DeviceSecurity feature: https://github.com/DMTF/libspdm TCG PFP spec 1.06: https://trustedcomputinggroup.org/resource/pc-client-specific-platform-firm= ware-profile-specification/ The POC branch: https://github.com/tianocore/edk2-staging/tree/DeviceSecurity And the PATCH set has passed the EDKII CI: https://github.com/tianocore/edk2/pull/5508 v2 changes: - Fix typo: PcdEnableSpdmDeviceAuthenticaion -> PcdEnableSpdmDeviceAuthent= ication v3 changes: - Add new patch 10: Update ReadMe.rst for libspdm submodule license v4 changes: - Update submodule libspdm to latest tag PATCH 3: Reviewed-by: Liming Gao PATCH 5: Review= ed-by: Jiewen Yao PATCH 6: Reviewed-by: Jiewen Yao <= jiewen.yao@intel.com> PATCH 7: Reviewed-by: Joey Vagedes PATCH 9: Reviewed-by: Jiewen Yao Cc: Andrew Fish Cc: Leif Lindholm Cc: Michael D Kinney Cc: Liming Gao Cc: Sean Brogan Cc: Joey Vagedes Cc: Zhiguang Liu Cc: Rahul Kumar Cc: Jiewen Yao Signed-off-by: Wenxing Hou Wenxing Hou (10): MdePkg: Add SPDM1.2 support. MdePkg: Add TCG PFP 1.06 support. MdePkg: Add devAuthBoot GlobalVariable MdeModulePkg/Variable: Add TCG SPDM device measurement update SecurityPkg: Add TCG PFP 1.06 support. SecurityPkg: add DeviceSecurity support .pytool/CISettings.py: add libspdm submodule. .gitmodule: Add libspdm submodule for EDKII SecurityPkg: Add libspdm submodule ReadMe.rst: Add libspdm submodule license .gitmodules | 3 + .pytool/CISettings.py | 2 + MdeModulePkg/MdeModulePkg.dec | 5 + .../Variable/RuntimeDxe/Measurement.c | 38 +- .../RuntimeDxe/VariableRuntimeDxe.inf | 3 + .../RuntimeDxe/VariableSmmRuntimeDxe.inf | 3 + MdePkg/Include/Guid/GlobalVariable.h | 8 +- MdePkg/Include/Guid/ImageAuthentication.h | 5 +- MdePkg/Include/IndustryStandard/Spdm.h | 1112 ++++++++++++++++- .../IndustryStandard/UefiTcgPlatform.h | 186 ++- ReadMe.rst | 1 + .../OsStub/CryptlibWrapper/CryptlibWrapper.c | 970 ++++++++++++++ .../CryptlibWrapper/CryptlibWrapper.inf | 38 + .../OsStub/MemLibWrapper/MemLibWrapper.c | 177 +++ .../OsStub/MemLibWrapper/MemLibWrapper.inf | 33 + .../PlatformLibWrapper/PlatformLibWrapper.c | 85 ++ .../PlatformLibWrapper/PlatformLibWrapper.inf | 33 + .../SpdmLib/Include/Stub/SpdmLibStub.h | 347 +++++ .../SpdmLib/Include/hal/LibspdmStdBoolAlt.h | 23 + .../SpdmLib/Include/hal/LibspdmStdDefAlt.h | 16 + .../SpdmLib/Include/hal/LibspdmStdIntAlt.h | 25 + .../DeviceSecurity/SpdmLib/Include/hal/base.h | 94 ++ .../SpdmLib/Include/hal/library/debuglib.h | 39 + .../SpdmLib/Include/library/spdm_lib_config.h | 394 ++++++ .../DeviceSecurity/SpdmLib/SpdmCommonLib.inf | 47 + .../DeviceSecurity/SpdmLib/SpdmCryptLib.inf | 45 + .../SpdmLib/SpdmDeviceSecretLibNull.inf | 36 + .../SpdmLib/SpdmRequesterLib.inf | 59 + .../SpdmLib/SpdmResponderLib.inf | 61 + .../SpdmLib/SpdmSecuredMessageLib.inf | 44 + .../SpdmLib/SpdmTransportMctpLib.inf | 38 + .../SpdmLib/SpdmTransportPciDoeLib.inf | 38 + SecurityPkg/DeviceSecurity/SpdmLib/libspdm | 1 + .../SpdmSecurityLib/SpdmAuthentication.c | 697 +++++++++++ .../SpdmSecurityLib/SpdmConnectionInit.c | 481 +++++++ .../SpdmSecurityLib/SpdmMeasurement.c | 714 +++++++++++ .../SpdmSecurityLib/SpdmSecurityLib.c | 148 +++ .../SpdmSecurityLib/SpdmSecurityLib.inf | 54 + .../SpdmSecurityLib/SpdmSecurityLibInternal.h | 250 ++++ SecurityPkg/Inc= lude/Library/SpdmSecurityLib.h | 437 +++++++ SecurityPkg/Include/Library/Tpm2CommandLib.h | 23 +- .../Include/Protocol/DeviceSecurityPolicy.h | 133 ++ .../HashLibBaseCryptoRouterDxe.c | 88 +- .../Library/Tpm2CommandLib/Tpm2NVStorage.c | 122 +- SecurityPkg/SecurityPkg.ci.yaml | 17 +- SecurityPkg/SecurityPkg.dec | 13 +- SecurityPkg/SecurityPkg.dsc | 31 +- SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.c | 61 +- SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf | 4 +- 49 files changed, 7197 insertions(+), 85 deletions(-) create mode 100644 = SecurityPkg/DeviceSecurity/OsStub/CryptlibWrapper/CryptlibWrapper.c create mode 100644 SecurityPkg/DeviceSecurity/OsStub/CryptlibWrapper/Crypt= libWrapper.inf create mode 100644 SecurityPkg/DeviceSecurity/OsStub/MemLibWrapper/MemLibW= rapper.c create mode 100644 SecurityPkg/DeviceSecurity/OsStub/MemLibWrapper/MemLibW= rapper.inf create mode 100644 SecurityPkg/DeviceSecurity/OsStub/PlatformLibWrapper/Pl= atformLibWrapper.c create mode 100644 SecurityPkg/DeviceSecurity/OsStub/PlatformLibWrapper/Pl= atformLibWrapper.inf create mode 100644 SecurityPkg/DeviceSecurity/SpdmLib/Include/Stub/SpdmLib= Stub.h create mode 100644 SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmS= tdBoolAlt.h create mode 100644 SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmS= tdDefAlt.h create mode 100644 SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/LibspdmS= tdIntAlt.h create mode 100644 SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/base.h create mode 100644 SecurityPkg/DeviceSecurity/SpdmLib/Include/hal/library/= debuglib.h create mode 100644 SecurityPkg/DeviceSecurity/SpdmLib/Include/library/spdm= _lib_config.h create mode 100644 SecurityPkg/DeviceSecurity/SpdmLib/SpdmCommonLib.inf create mode 100644 SecurityPkg/DeviceSecurity/SpdmLib/SpdmCryptLib.inf create mode 100644 SecurityPkg/DeviceSecurity/SpdmLib/SpdmDeviceSecretLibN= ull.inf create mode 100644 SecurityPkg/DeviceSecurity/SpdmLib/SpdmRequesterLib.inf create mode 100644 SecurityPkg/DeviceSecurity/SpdmLib/SpdmResponderLib.inf create mode 100644 SecurityPkg/DeviceSecurity/SpdmLib/SpdmSecuredMessageLi= b.inf create mode 100644 SecurityPkg/DeviceSecurity/SpdmLib/SpdmTransportMctpLib= .inf create mode 100644 SecurityPkg/DeviceSecurity/SpdmLib/SpdmTransportPciDoeL= ib.inf create mode 160000 SecurityPkg/DeviceSecurity/SpdmLib/libspdm create mode 100644 SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmAuthenti= cation.c create mode 100644 SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmConnecti= onInit.c create mode 100644 SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmMeasurem= ent.c create mode 100644 SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurity= Lib.c create mode 100644 SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurity= Lib.inf create mode 100644 SecurityPkg/DeviceSecurity/SpdmSecurityLib/SpdmSecurity= LibInternal.h create mode 100644 SecurityPkg/Include/Library/SpdmSecurityLib.h create mode 100644 SecurityPkg/Include/Protocol/DeviceSecurityPolicy.h -- 2.26.2.windows.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#117981): https://edk2.groups.io/g/devel/message/117981 Mute This Topic: https://groups.io/mt/105594737/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-