From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by spool.mail.gandi.net (Postfix) with ESMTPS id BC954740034 for ; Thu, 12 Oct 2023 05:50:14 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=8UdFMvdBWA1LEtn+pBTIb/7UlWrzo5UJ9UpmnAvbEDA=; c=relaxed/simple; d=groups.io; h=ARC-Seal:ARC-Message-Signature:ARC-Authentication-Results:From:To:CC:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding; s=20140610; t=1697089813; v=1; b=jQKmQ2GWjPl6QAi8MkvzGKhlB9QQe8nT2eYyiYNpaYEIjEDc9A2ci9mXLw8KRLgpo7X83/xj sTPABSMguLooCIfYlOV833wF6oAb+LdgNi/J8j81JswcqjFlIz/b1NIUjplmbYGs9zF5J7TSteO tiPHO83ME8djOas+YH81yIsY= X-Received: by 127.0.0.2 with SMTP id 7HDvYY7687511xClPNuPp1LP; Wed, 11 Oct 2023 22:50:13 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.136]) by mx.groups.io with SMTP id smtpd.web11.5145.1697089811954549855 for ; Wed, 11 Oct 2023 22:50:12 -0700 X-IronPort-AV: E=McAfee;i="6600,9927,10860"; a="364206004" X-IronPort-AV: E=Sophos;i="6.03,218,1694761200"; d="scan'208";a="364206004" X-Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Oct 2023 22:50:11 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10860"; a="824456413" X-IronPort-AV: E=Sophos;i="6.03,218,1694761200"; d="scan'208";a="824456413" X-Received: from fmsmsx601.amr.corp.intel.com ([10.18.126.81]) by fmsmga004.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 11 Oct 2023 22:50:11 -0700 X-Received: from fmsmsx610.amr.corp.intel.com (10.18.126.90) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.32; Wed, 11 Oct 2023 22:50:10 -0700 X-Received: from FMSEDG603.ED.cps.intel.com (10.1.192.133) by fmsmsx610.amr.corp.intel.com (10.18.126.90) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.32 via Frontend Transport; Wed, 11 Oct 2023 22:50:10 -0700 X-Received: from NAM11-BN8-obe.outbound.protection.outlook.com (104.47.58.168) by edgegateway.intel.com (192.55.55.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.32; Wed, 11 Oct 2023 22:50:10 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=N1tWWdX9MpTc0k2udr7tz0tAMrv8QuTWBDeHgfx024zLZF0aRdO6DJ8KMmwQcU2kdF6PdCWz4G5mxoYzYR74UiYtQ3i5NksX1aO6VxPgCjEpQnAKqwbKnxSqDnruJ2muGF1bHlY4Nz7PwmGJTl01KYhvU+/3ru59Wj1SILpqGe2CKt6lLu68ItICMPnlStF7REp6tlngpM8d89F3kIITk9ZK+Gj4wg8w3zSUsenRKstV2kMSGyQl9JZk0Cg5Vv3GO6a88pCYlE2RrPXnVlFBvDomyXpYE2rrOvxF1ljcd93sjdoxffljWs2/7/7T3I5uUSn6eNHWX6KdMMg6HVC74A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=IrLdhawwFjsQFzJLdLye9LuNcYCHwqB/D+jPoTGNdFo=; b=nPezVfJ5qWY5sQCiPXmgAyjhVXUcAV57iGNWsaQqRI/MoetpfauowftOxm57Gwa1J6STSDDBjD+728SVR32R7HXTEptYIUiwIfpnZR/TG/qweMT7fti/itCpkrtri50Cd5+c6vgYWO+ylG+LKOK4Or7akJVuG5m1XYAbIvrbu95MQoDsUJYweycmJgZW4rZIqH061JDKYE0RIQCWfC8vQB9jvMCzF5I/9XILxgwE+UbAPMHLi99J/2drrd6fpHsKD4mCkjxd6h0RdEN9sVFwUDN5HsJXFIS9+Y0EhXUFeRnBSvXMeWu9QPOeGENcAAl6ausJIGmweR6CZrBXMASshA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none X-Received: from SJ1PR11MB6227.namprd11.prod.outlook.com (2603:10b6:a03:45a::10) by SJ0PR11MB5865.namprd11.prod.outlook.com (2603:10b6:a03:428::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6863.38; Thu, 12 Oct 2023 05:50:07 +0000 X-Received: from SJ1PR11MB6227.namprd11.prod.outlook.com ([fe80::ece6:2daa:9c47:4655]) by SJ1PR11MB6227.namprd11.prod.outlook.com ([fe80::ece6:2daa:9c47:4655%7]) with mapi id 15.20.6863.043; Thu, 12 Oct 2023 05:50:07 +0000 From: "Li, Yi" To: "devel@edk2.groups.io" , "Li, Yi1" , "Hou, Wenxing" CC: "Yao, Jiewen" , "Lu, Xiaoyu1" , "Jiang, Guomin" Subject: Re: [edk2-devel] [PATCH v3 00/11] Add HMAC/HKDF/RSA/HASH/AES features based on Mbedtls Thread-Topic: [edk2-devel] [PATCH v3 00/11] Add HMAC/HKDF/RSA/HASH/AES features based on Mbedtls Thread-Index: AQHZ8iFPzU9CKgWt7kSMdhjJuGMjH7A+Uc3wgAdpbEA= Date: Thu, 12 Oct 2023 05:50:07 +0000 Message-ID: References: <20230928153416.537-1-wenxing.hou@intel.com> <178BD38EB7306FC4.5378@groups.io> In-Reply-To: <178BD38EB7306FC4.5378@groups.io> Accept-Language: zh-CN, en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: SJ1PR11MB6227:EE_|SJ0PR11MB5865:EE_ x-ms-office365-filtering-correlation-id: 1ee695c9-999e-49d4-5ae6-08dbcae7170e x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: 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 x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?y9HNJUsRvCbSsK/xv826VSS0x3gdeAqXaPqHC7qsgvGEWHBvFonIwgNZnfmJ?= =?us-ascii?Q?/poB1ELndxSbsn7JRo697RXxbyGnab6pVPgBn6yxWqyRB4/XqY0BTzktks9F?= =?us-ascii?Q?nuqhHjk51Hzval8/UTi0CCxsT/QKw7b8xYwxSXcJgt/ONGFNjTAa1/pLUEiV?= =?us-ascii?Q?mUAYmMCqKtd02MgVi5Xb4JqJoZ5Qcix57UwNNxlhnqYBMFf9PTvsuvWppRnk?= =?us-ascii?Q?hsYWjgaIgro6m/yPbRagK7rKEfjZ9OSu62EXK5QVs8nwsmDJ8OjNZqcG1e0W?= =?us-ascii?Q?Nb+xZsFvDy8yQ1j4vVDxoGJ7gBOokh4cx8L1G6MDY1GKvAcQcUUe0CKEItrm?= =?us-ascii?Q?lu9H6Db80BdNzRZoEexCdoEzFUfPyGd+a7v4Ym6p5TxbJK71KKlk3JmeFhNz?= =?us-ascii?Q?7nuj6aakd9/SAEnqLcLMQo45yU5bmxgUH4kPFNgAXqbpwbAmW1rfXQGHrmyV?= =?us-ascii?Q?swL0UngIm9QgC1Y0Kzvv1eAF9012V+R2t52Q6/+3cyGib08l4kTc1X9XQb0u?= =?us-ascii?Q?jc3Qi3R3JzzAPA96ZqBkoJc8uDO41XMBg51/p8ihKDvftDrmvtmJaZ5ISZcp?= =?us-ascii?Q?JyKw5rWMjUcm6gTHM8cBOQwipS4kP/PoY5MxzNrR9Q6tRCat+1c/azvr8CMY?= =?us-ascii?Q?mPSxu0i0Q46cu6T5UuIc0/iG/2VXs25ou4Ba8Ut9ZlP3ph6QcrJBXhl+n2KP?= =?us-ascii?Q?5cNVKzz0LvXpm9BpRqmYYAJcInBbJucA8Q7tCX+h+3kx4xxU49fRPe0eTUt2?= =?us-ascii?Q?zS9QwQznSqHdr2u2yT0dvaLsi6rDZWBqXJg9mWt/feCRW+2puYe/TRszTS/Z?= =?us-ascii?Q?lY5Dh4wXmKCa7/uS3sLJnJRwCULg9o+/fYcxPoXeqZz/ttiHgsskMjK4XzrE?= =?us-ascii?Q?yfqWp0/RRRRox2Tcnu4rmApi90JeffRWk/eVYN2+BeGARxHGRfbRb3mOY13p?= =?us-ascii?Q?0cUhpP/+9ZMCyRmKN7Ypcc5Nfxr1jC7l0cDIS1zNCrHXNCvjxFsgjXYGA/Hd?= =?us-ascii?Q?szqp3aQzAZoFVWLD6EwEfOoT2/wEned4GWOhOUCXAQAvm2yzBY7bL13p4+Xc?= =?us-ascii?Q?9JDuEZp8zhzCHI+7/QZkinAJ42saDa5Vxswu7J57WeHNbkk8agPyEE4GJX5p?= =?us-ascii?Q?BLY6sZ2bxg6fUI92F3u7R4Mn0pyNXaP8Pxm9w+CS+HwVciYxD5OAyDCXcGPi?= =?us-ascii?Q?g4Pk6vJA7Ob5h4GLgjUFAwMsdPn+9psgGtNT9w2drHG8+T17bEVS/GymVQZr?= =?us-ascii?Q?Uho3i/E+RaOfn3uoy+Ezu7cYMAmy6R8H3EbVTFleu490JesRmF9SMQcmDeCM?= =?us-ascii?Q?oD/Jl39UwitKPcKQDqOsij3woVFKSy3U53fK6yKwLmTbL4o0U6Atr4fXGN9v?= =?us-ascii?Q?TQBujlW3UVQiWj3zGiHtEc1eirwBmunAx3EWGGFgYs4qzN3EQXUg3u589woI?= =?us-ascii?Q?BsllEZXlrhEAZvCZrELhCzSgpO4mglBzDo+CvZ+IKCYacnjdAbvKGaDBVQKy?= =?us-ascii?Q?sHHifwD0sQQjgsUqbqil4C1EfEiqdEdKZ/5d43zyqNcyyYNQwyIFLCO+lzFk?= =?us-ascii?Q?BlhU4YVJ8jrzq/YHGsc=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: SJ1PR11MB6227.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 1ee695c9-999e-49d4-5ae6-08dbcae7170e X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Oct 2023 05:50:07.5649 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: h+CuR8Hrf0S9bdkA4V/TbeVQ729OcCdevoPIpztNEdyJDtWbHIGtRGy0CgCPBXxkckNB+3WjSrAjKn1+vhrC+Q== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR11MB5865 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,yi1.li@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: 4rWhSbKG75FUhwM6x2VzJJ4vx7686176AA= Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20140610 header.b=jQKmQ2GW; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io; arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}") Patch merged via: https://github.com/tianocore/edk2/pull/4897 Thanks for your contribution. Regards, Yi=20 -----Original Message----- From: devel@edk2.groups.io On Behalf Of Li, Yi Sent: Saturday, October 7, 2023 8:38 PM To: Hou, Wenxing ; devel@edk2.groups.io Cc: Yao, Jiewen ; Lu, Xiaoyu1 ;= Jiang, Guomin Subject: Re: [edk2-devel] [PATCH v3 00/11] Add HMAC/HKDF/RSA/HASH/AES featu= res based on Mbedtls Looks good to me. Reviewed-by: Yi Li -----Original Message----- From: Hou, Wenxing =20 Sent: Thursday, September 28, 2023 11:34 PM To: devel@edk2.groups.io Cc: Yao, Jiewen ; Li, Yi1 ; Lu, Xia= oyu1 ; Jiang, Guomin Subject: [PATCH v3 00/11] Add HMAC/HKDF/RSA/HASH/AES features based on Mbed= tls Purpose: This patch is needed to resolve the limitation from OpenSSL 3.0 th= at HMAC/HKDF/RSA cannot work in pre-memory phase. There are five features based on mbedtls in the patch: HMAC/HKDF/RSA/HASH/A= ES. Test: The patch has passed the unit_test and fuzz test. And the patch has p= assed testing on the Intel platform. POC: https://github.com/tianocore/edk2- staging/tree/OpenSSL11_EOL/CryptoPkg/Library/BaseCryptLibMbedTls REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D4177 Cc: Jiewen Yao Cc: Yi Li Cc: Xiaoyu Lu Cc: Guomin Jiang Signed-off-by: Wenxing Hou Wenxing Hou (11): CryptoPkg: Add mbedtls submodule for EDKII CryptoPkg: Add mbedtls_config and MbedTlsLib.inf CryptoPkg: Add HMAC functions based on Mbedtls CryptoPkg: Add HKDF functions based on Mbedtls CryptoPkg: Add RSA functions based on Mbedtls CryptoPkg: Add all .inf files for BaseCryptLibMbedTls CryptoPkg: Add Null functions for building pass CryptoPkg: Add MD5/SHA1/SHA2 functions based on Mbedtls CryptoPkg: Add Mbedtls submodule in CI CryptoPkg: Add basic Readme for BaseCryptLibMbedTls CryptoPkg: Add CryptAes functions based on Mbedtls Add CryptAes APIS. .gitmodules | 3 + .pytool/CISettings.py | 2 + CryptoPkg/CryptoPkg.ci.yaml | 12 +- CryptoPkg/CryptoPkg.dec | 5 + CryptoPkg/CryptoPkg.dsc | 8 + CryptoPkg/CryptoPkgMbedTls.dsc | 280 ++ .../BaseCryptLibMbedTls/BaseCryptLib.inf | 81 + .../BaseCryptLibMbedTls/Bn/CryptBnNull.c | 520 +++ .../Cipher/CryptAeadAesGcmNull.c | 100 + .../BaseCryptLibMbedTls/Cipher/CryptAes.c | 225 + .../BaseCryptLibMbedTls/Cipher/CryptAesNull.c | 159 + .../BaseCryptLibMbedTls/Hash/CryptMd5.c | 226 + .../BaseCryptLibMbedTls/Hash/CryptMd5Null.c | 163 + .../Hash/CryptParallelHashNull.c | 40 + .../BaseCryptLibMbedTls/Hash/CryptSha1.c | 226 + .../BaseCryptLibMbedTls/Hash/CryptSha1Null.c | 166 + .../BaseCryptLibMbedTls/Hash/CryptSha256.c | 219 + .../Hash/CryptSha256Null.c | 162 + .../BaseCryptLibMbedTls/Hash/CryptSha512.c | 431 ++ .../Hash/CryptSha512Null.c | 275 ++ .../BaseCryptLibMbedTls/Hash/CryptSm3Null.c | 164 + .../BaseCryptLibMbedTls/Hmac/CryptHmac.c | 678 +++ .../BaseCryptLibMbedTls/Hmac/CryptHmacNull.c | 359 ++ .../BaseCryptLibMbedTls/InternalCryptLib.h | 25 + .../BaseCryptLibMbedTls/Kdf/CryptHkdf.c | 372 ++ .../BaseCryptLibMbedTls/Kdf/CryptHkdfNull.c | 192 + .../BaseCryptLibMbedTls/PeiCryptLib.inf | 101 + .../BaseCryptLibMbedTls/PeiCryptLib.uni | 25 + .../BaseCryptLibMbedTls/Pem/CryptPemNull.c | 69 + .../Pk/CryptAuthenticodeNull.c | 45 + .../BaseCryptLibMbedTls/Pk/CryptDhNull.c | 150 + .../BaseCryptLibMbedTls/Pk/CryptEcNull.c | 578 +++ .../Pk/CryptPkcs1OaepNull.c | 51 + .../Pk/CryptPkcs5Pbkdf2Null.c | 48 + .../Pk/CryptPkcs7Internal.h | 83 + .../Pk/CryptPkcs7SignNull.c | 53 + .../Pk/CryptPkcs7VerifyEkuNull.c | 152 + .../Pk/CryptPkcs7VerifyEkuRuntime.c | 56 + .../Pk/CryptPkcs7VerifyNull.c | 163 + .../Pk/CryptPkcs7VerifyRuntime.c | 38 + .../BaseCryptLibMbedTls/Pk/CryptRsaBasic.c | 278 ++ .../Pk/CryptRsaBasicNull.c | 121 + .../BaseCryptLibMbedTls/Pk/CryptRsaExtNull.c | 117 + .../BaseCryptLibMbedTls/Pk/CryptRsaPss.c | 174 + .../BaseCryptLibMbedTls/Pk/CryptRsaPssNull.c | 46 + .../Pk/CryptRsaPssSignNull.c | 60 + .../BaseCryptLibMbedTls/Pk/CryptTsNull.c | 42 + .../BaseCryptLibMbedTls/Pk/CryptX509Null.c | 753 ++++ .../BaseCryptLibMbedTls/Rand/CryptRandNull.c | 56 + .../BaseCryptLibMbedTls/RuntimeCryptLib.inf | 92 + .../BaseCryptLibMbedTls/RuntimeCryptLib.uni | 22 + .../BaseCryptLibMbedTls/SecCryptLib.inf | 84 + .../BaseCryptLibMbedTls/SecCryptLib.uni | 17 + .../BaseCryptLibMbedTls/SmmCryptLib.inf | 92 + .../BaseCryptLibMbedTls/SmmCryptLib.uni | 22 + .../SysCall/ConstantTimeClock.c | 75 + .../BaseCryptLibMbedTls/SysCall/CrtWrapper.c | 58 + .../SysCall/RuntimeMemAllocation.c | 462 ++ .../SysCall/TimerWrapper.c | 198 + .../BaseCryptLibMbedTls/TestBaseCryptLib.inf | 76 + CryptoPkg/Library/Include/stdint.h | 19 + CryptoPkg/Library/Include/stubs-32.h | 9 + CryptoPkg/Library/MbedTlsLib/CrtWrapper.c | 96 + CryptoPkg/Library/MbedTlsLib/EcSm2Null.c | 495 +++ .../Include/mbedtls/mbedtls_config.h | 3823 +++++++++++++++++ CryptoPkg/Library/MbedTlsLib/MbedTlsLib.inf | 171 + .../Library/MbedTlsLib/MbedTlsLibFull.inf | 175 + CryptoPkg/Library/MbedTlsLib/mbedtls | 1 + CryptoPkg/Private/Library/MbedTlsLib.h | 12 + CryptoPkg/Readme.md | 16 +- .../UnitTest/Library/BaseCryptLib/HashTests.c | 33 +- .../UnitTest/Library/BaseCryptLib/HmacTests.c | 60 +- .../UnitTest/Library/BaseCryptLib/RsaTests.c | 10 + 73 files changed, 14446 insertions(+), 24 deletions(-) create mode 100644= CryptoPkg/CryptoPkgMbedTls.dsc create mode 100644 CryptoPkg/Library/BaseC= ryptLibMbedTls/BaseCryptLib.inf create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Bn/CryptBnNull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Cipher/CryptAeadA= esGcmNull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Cipher/CryptAes.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Cipher/CryptAesNu= ll.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptMd5.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptMd5Null= .c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptParalle= lHashNull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha1.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha1Nul= l.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha256.= c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha256N= ull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha512.= c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha512N= ull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSm3Null= .c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hmac/CryptHmac.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hmac/CryptHmacNul= l.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/InternalCryptLib.= h create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Kdf/CryptHkdf.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Kdf/CryptHkdfNull= .c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/PeiCryptLib.inf create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/PeiCryptLib.uni create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pem/CryptPemNull.= c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptAuthentic= odeNull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptDhNull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptEcNull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs1Oaep= Null.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs5Pbkd= f2Null.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7Inte= rnal.h create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7Sign= Null.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7Veri= fyEkuNull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7Veri= fyEkuRuntime.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7Veri= fyNull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7Veri= fyRuntime.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaBasic.= c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaBasicN= ull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaExtNul= l.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaPss.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaPssNul= l.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaPssSig= nNull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptTsNull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptX509Null.= c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Rand/CryptRandNul= l.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/RuntimeCryptLib.i= nf create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/RuntimeCryptLib.u= ni create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SecCryptLib.inf create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SecCryptLib.uni create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SmmCryptLib.inf create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SmmCryptLib.uni create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SysCall/ConstantT= imeClock.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SysCall/CrtWrappe= r.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SysCall/RuntimeMe= mAllocation.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SysCall/TimerWrap= per.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/TestBaseCryptLib.= inf create mode 100644 CryptoPkg/Library/Include/stdint.h create mode 100644 CryptoPkg/Library/Include/stubs-32.h create mode 100644 CryptoPkg/Library/MbedTlsLib/CrtWrapper.c create mode 100644 CryptoPkg/Library/MbedTlsLib/EcSm2Null.c create mode 100644 CryptoPkg/Library/MbedTlsLib/Include/mbedtls/mbedtls_co= nfig.h create mode 100644 CryptoPkg/Library/MbedTlsLib/MbedTlsLib.inf create mode 100644 CryptoPkg/Library/MbedTlsLib/MbedTlsLibFull.inf create mode 160000 CryptoPkg/Library/MbedTlsLib/mbedtls create mode 100644 CryptoPkg/Private/Library/MbedTlsLib.h -- 2.26.2.windows.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#109537): https://edk2.groups.io/g/devel/message/109537 Mute This Topic: https://groups.io/mt/101639971/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-