From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by spool.mail.gandi.net (Postfix) with ESMTPS id 65B84AC0F38 for ; Sat, 7 Oct 2023 12:38:16 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=O4Bg7enzEt1/D/F0Y27w0jkbsrpK/1C2PkfrW16TJeQ=; c=relaxed/simple; d=groups.io; h=ARC-Seal:ARC-Message-Signature:ARC-Authentication-Results:From:To:CC:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding; s=20140610; t=1696682295; v=1; b=t0goNCCugbjoFRN5GbOwIpkiG5QvfIcsK6nkWPgXftzXJ09FMk9sccsp1slM+1eyEAag1gts Vi2uquhY3Amu1FrJCsYiJzud0ntAwp89vex7/Yv83nVEcDQUEBq1+hDOP2UEunHe+j5vz8sDlL3 /M5Mxe8slWdYxI5gWc8YqYDk= X-Received: by 127.0.0.2 with SMTP id Xr94YY7687511xHKrbw8WoHp; Sat, 07 Oct 2023 05:38:15 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.43]) by mx.groups.io with SMTP id smtpd.web10.16678.1696682293836769567 for ; Sat, 07 Oct 2023 05:38:14 -0700 X-IronPort-AV: E=McAfee;i="6600,9927,10856"; a="470188514" X-IronPort-AV: E=Sophos;i="6.03,205,1694761200"; d="scan'208";a="470188514" X-Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Oct 2023 05:38:11 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10856"; a="843186128" X-IronPort-AV: E=Sophos;i="6.03,205,1694761200"; d="scan'208";a="843186128" X-Received: from fmsmsx602.amr.corp.intel.com ([10.18.126.82]) by FMSMGA003.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 07 Oct 2023 05:38:11 -0700 X-Received: from fmsmsx611.amr.corp.intel.com (10.18.126.91) by fmsmsx602.amr.corp.intel.com (10.18.126.82) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.32; Sat, 7 Oct 2023 05:38:11 -0700 X-Received: from fmsmsx610.amr.corp.intel.com (10.18.126.90) by fmsmsx611.amr.corp.intel.com (10.18.126.91) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.32; Sat, 7 Oct 2023 05:38:11 -0700 X-Received: from FMSEDG603.ED.cps.intel.com (10.1.192.133) by fmsmsx610.amr.corp.intel.com (10.18.126.90) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.32 via Frontend Transport; Sat, 7 Oct 2023 05:38:11 -0700 X-Received: from NAM11-BN8-obe.outbound.protection.outlook.com (104.47.58.168) by edgegateway.intel.com (192.55.55.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.32; Sat, 7 Oct 2023 05:38:10 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=X13SMjq6ZWBWh62u5FwTWEVNTteY5VVxCCS4I/oS2ouq57ej/0dysK81SQnr/zZbtRIZOEwWCFjHcKRYhAEtHboNFRw/xFeSTCRy6rf3WIyq93Cd9ULKBglGwd+oOOAUksKJa3QkMyWO+OzfEp5ZEJBmErf8KeE4BV2S2rdlIgovAZwl38yeduEK8ETirwzgQS8nLkPQ6ks/cA3ajhRN6QlXeZ36EaPWNS3XQyGP+kR4hIDi7+97O7lUDlqCZsJgYSxzOQZ/BdwUV1pG2tvOwvuG/IM4ty1WO7PEf3AY23cY2UdyT3mScJ0yIuoyIQpdJANU8afggA+eFzpeOE/sBg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=7OYf2iYTuObVnAV/RODeUdBmGIcinAg1yIqMIh6AoDI=; b=ep8ZXGe/H8udT8IlM7eJYptA619vXqHDuPKitqHJ3EfIWYJXseoIeWnHHr33Z3YW1e7ZI2kTR9FpfW/UXxoXrwoOCSiyxQgaOnWC78gOgqC8efsy2iz1kWCdYApApO1qqzc2nNJ0rhdxHJWhACXaYGn8lPH3XymudlRffDSGz5Wc+SHG6llOw8MBHVeYPtBam0jgHaZYmdo3Tf1MoKj1Vhl+uLf+pYZrUIMe1gVUm5Kt3PZDvgAGcxF3lb+NdkiDDNzEXGq8ghaB/sU68Y5lYuf6lYVJcyK0T1VMElbqhKkXbX7LOwgxl+q/HtYbjNt8Lv+l0xmc3abbjG+e+Kd3uQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none X-Received: from SJ1PR11MB6227.namprd11.prod.outlook.com (2603:10b6:a03:45a::10) by CH0PR11MB5474.namprd11.prod.outlook.com (2603:10b6:610:d5::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6838.42; Sat, 7 Oct 2023 12:38:03 +0000 X-Received: from SJ1PR11MB6227.namprd11.prod.outlook.com ([fe80::ece6:2daa:9c47:4655]) by SJ1PR11MB6227.namprd11.prod.outlook.com ([fe80::ece6:2daa:9c47:4655%7]) with mapi id 15.20.6838.033; Sat, 7 Oct 2023 12:38:03 +0000 From: "Li, Yi" To: "Hou, Wenxing" , "devel@edk2.groups.io" CC: "Yao, Jiewen" , "Lu, Xiaoyu1" , "Jiang, Guomin" Subject: Re: [edk2-devel] [PATCH v3 00/11] Add HMAC/HKDF/RSA/HASH/AES features based on Mbedtls Thread-Topic: [PATCH v3 00/11] Add HMAC/HKDF/RSA/HASH/AES features based on Mbedtls Thread-Index: AQHZ8iFPzU9CKgWt7kSMdhjJuGMjH7A+Uc3w Date: Sat, 7 Oct 2023 12:38:02 +0000 Message-ID: References: <20230928153416.537-1-wenxing.hou@intel.com> In-Reply-To: <20230928153416.537-1-wenxing.hou@intel.com> Accept-Language: zh-CN, en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: SJ1PR11MB6227:EE_|CH0PR11MB5474:EE_ x-ms-office365-filtering-correlation-id: 312cd1eb-beb5-43f5-fb85-08dbc7323f83 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: 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 x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?SGDF50Nj/iBwBaLkaseY2fxdJ0WlDsPV/BS2aWwksDB/Q6Xz+eJrLHCktq+H?= =?us-ascii?Q?irL5ya1uaTvxlGxqOVOEqUI3sunZEgxr8e3UdBgMol/5nEEF1d2gA6mqlALf?= =?us-ascii?Q?FsKpbYJihdRngZIhFFTeB/ts3uBjYYZTPBWkbCUkhqWD98Hv2cGUa0X+OAoj?= =?us-ascii?Q?WQusZDdBFPNOHsvgBUaz3/ccOXymymgW1Ed0GcMVDYTQ37OknDzp0wxPm3Jq?= =?us-ascii?Q?gkD3XBW8o1dEOhhyyfg47/HXjpqstdEal1oSyiNEOJwYlt5ekQnMxgokwfNb?= =?us-ascii?Q?HH24hF9vVxxx62Mft0H7eXB/zceCCEeGYI+fEus3Hp0dPKT/Bys4Qj6R9nhi?= =?us-ascii?Q?nH8ySYiikoyS0sy7ViVE5oLXnKk0InsANH0tzPfqDa+ZZcd5gJqsKU7LVDGK?= =?us-ascii?Q?cbbPfuXsv0YEC5PkDNDnfKcMuFVQm9wsbdy5OtBMPz3YO/R10TrhmdxXkcmu?= =?us-ascii?Q?pvUuuJ5HcsFrs7KHk0/SWEqTnJdoiN+SGAx5jX56pphES1XxELCzfl9JXiDq?= =?us-ascii?Q?G2NqCDYSHaCiiwSLZd25Lnw+GEHQ7/cCRoImrkkh7UwHe2meCx2PapmCgy7T?= =?us-ascii?Q?e36PNu9QWpaO3PE/hZhvVVC+pcx3oM1+QUuGSfplS6L74wO3SkngH7q74PQB?= =?us-ascii?Q?wjVkGiPDHN3v21WxAcxNuGq2+OU2VQAA91HNciTz0K90G9WrQhWGSrJkvxVG?= =?us-ascii?Q?wulob0F1rlfK67/Ryz1x9urzATwVOgBn1a9MvaoEsWsXXhdIqLueiNZ6s3/c?= =?us-ascii?Q?QFE/tYa2HE++RbHXyPYsIWEIMnMMNGE0k5l+J1DoOJ+aFzFxa67aeDGmzbXM?= =?us-ascii?Q?x9qtrdSoQybnvGmQ1kaNn5pOZM9+qKdfU0AefiHNvoEMh9PR3u+fP52+f6CU?= =?us-ascii?Q?OUSGZ4VubuHSYGpy/sdLkc0An0DXwZ7HY49u34ces+geT92hI3QQZlMlreXi?= =?us-ascii?Q?HchA/MdKDhvWTwUCy5XmCqKOB3Exqw2Y4mZfPk7PIDGACkvJ87k0edc9uuvK?= =?us-ascii?Q?zjlQI5ARZMTgjNiXA6ZoE8ZyGJlN2KFD05oi7UzWActSSklcyg0WgJ2pPBA/?= =?us-ascii?Q?MBqciHuKMZ8Ly76Ln+6muuxsGKTTouhH+XqEAg2YABFd1+QSvD/FWwvyp58p?= =?us-ascii?Q?z/TtswzYHRybjsOr6Qv+e/Hn/VEIsFcDOooNNFApiLDzv98tPRuz2pUmLibW?= =?us-ascii?Q?VavGofaUMIl+njLr29kAzuzGGglBu+ZdQ2nHKVgolionlP6pdt6zl9D/aRmR?= =?us-ascii?Q?7nrSCFBuxF1342gXgG3KRfuSkUrqlgIkvr3AEHJqMAxjuP1zalfqkdpjTlEE?= =?us-ascii?Q?EcGmgWaRqXnF9K/VyQJr2laU4wtMIP8qqcBqFQPvaqcXhP62hDqXvqr+JITa?= =?us-ascii?Q?UOsVzfnS2NCYBCp8ck8kSKgcmlGFQWFtrTKNT0zx79D6qSVo+vgcymADPanm?= =?us-ascii?Q?2E90GINXBD+ydxQA1WzK8kJevBLZupF+1DmprUnl+QMvCa+9RG3AMXw9Tfh/?= =?us-ascii?Q?kfNHl4EznwKEMHKlBGzY+xEpTG0ujDQqIdlVyZmbD0rP5MuHgDUZAfxoMlGJ?= =?us-ascii?Q?/4ybhrOneApv3TZOdT4=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: SJ1PR11MB6227.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 312cd1eb-beb5-43f5-fb85-08dbc7323f83 X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Oct 2023 12:38:03.0367 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: Il5IZYRDxbjmLzWo0QhGjKecgJfApF3hLJD80SiYow7K4h3UdDgP5BCwTL9uG1aa3Hr1Kr7noLDkIjmS9q1PJw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR11MB5474 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,yi1.li@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: qCNUUGhuBwkGlvMI0CgshrX5x7686176AA= Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20140610 header.b=t0goNCCu; arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}"); dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io Looks good to me. Reviewed-by: Yi Li -----Original Message----- From: Hou, Wenxing =20 Sent: Thursday, September 28, 2023 11:34 PM To: devel@edk2.groups.io Cc: Yao, Jiewen ; Li, Yi1 ; Lu, Xia= oyu1 ; Jiang, Guomin Subject: [PATCH v3 00/11] Add HMAC/HKDF/RSA/HASH/AES features based on Mbed= tls Purpose: This patch is needed to resolve the limitation from OpenSSL 3.0 th= at HMAC/HKDF/RSA cannot work in pre-memory phase. There are five features based on mbedtls in the patch: HMAC/HKDF/RSA/HASH/A= ES. Test: The patch has passed the unit_test and fuzz test. And the patch has p= assed testing on the Intel platform. POC: https://github.com/tianocore/edk2- staging/tree/OpenSSL11_EOL/CryptoPkg/Library/BaseCryptLibMbedTls REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D4177 Cc: Jiewen Yao Cc: Yi Li Cc: Xiaoyu Lu Cc: Guomin Jiang Signed-off-by: Wenxing Hou Wenxing Hou (11): CryptoPkg: Add mbedtls submodule for EDKII CryptoPkg: Add mbedtls_config and MbedTlsLib.inf CryptoPkg: Add HMAC functions based on Mbedtls CryptoPkg: Add HKDF functions based on Mbedtls CryptoPkg: Add RSA functions based on Mbedtls CryptoPkg: Add all .inf files for BaseCryptLibMbedTls CryptoPkg: Add Null functions for building pass CryptoPkg: Add MD5/SHA1/SHA2 functions based on Mbedtls CryptoPkg: Add Mbedtls submodule in CI CryptoPkg: Add basic Readme for BaseCryptLibMbedTls CryptoPkg: Add CryptAes functions based on Mbedtls Add CryptAes APIS. .gitmodules | 3 + .pytool/CISettings.py | 2 + CryptoPkg/CryptoPkg.ci.yaml | 12 +- CryptoPkg/CryptoPkg.dec | 5 + CryptoPkg/CryptoPkg.dsc | 8 + CryptoPkg/CryptoPkgMbedTls.dsc | 280 ++ .../BaseCryptLibMbedTls/BaseCryptLib.inf | 81 + .../BaseCryptLibMbedTls/Bn/CryptBnNull.c | 520 +++ .../Cipher/CryptAeadAesGcmNull.c | 100 + .../BaseCryptLibMbedTls/Cipher/CryptAes.c | 225 + .../BaseCryptLibMbedTls/Cipher/CryptAesNull.c | 159 + .../BaseCryptLibMbedTls/Hash/CryptMd5.c | 226 + .../BaseCryptLibMbedTls/Hash/CryptMd5Null.c | 163 + .../Hash/CryptParallelHashNull.c | 40 + .../BaseCryptLibMbedTls/Hash/CryptSha1.c | 226 + .../BaseCryptLibMbedTls/Hash/CryptSha1Null.c | 166 + .../BaseCryptLibMbedTls/Hash/CryptSha256.c | 219 + .../Hash/CryptSha256Null.c | 162 + .../BaseCryptLibMbedTls/Hash/CryptSha512.c | 431 ++ .../Hash/CryptSha512Null.c | 275 ++ .../BaseCryptLibMbedTls/Hash/CryptSm3Null.c | 164 + .../BaseCryptLibMbedTls/Hmac/CryptHmac.c | 678 +++ .../BaseCryptLibMbedTls/Hmac/CryptHmacNull.c | 359 ++ .../BaseCryptLibMbedTls/InternalCryptLib.h | 25 + .../BaseCryptLibMbedTls/Kdf/CryptHkdf.c | 372 ++ .../BaseCryptLibMbedTls/Kdf/CryptHkdfNull.c | 192 + .../BaseCryptLibMbedTls/PeiCryptLib.inf | 101 + .../BaseCryptLibMbedTls/PeiCryptLib.uni | 25 + .../BaseCryptLibMbedTls/Pem/CryptPemNull.c | 69 + .../Pk/CryptAuthenticodeNull.c | 45 + .../BaseCryptLibMbedTls/Pk/CryptDhNull.c | 150 + .../BaseCryptLibMbedTls/Pk/CryptEcNull.c | 578 +++ .../Pk/CryptPkcs1OaepNull.c | 51 + .../Pk/CryptPkcs5Pbkdf2Null.c | 48 + .../Pk/CryptPkcs7Internal.h | 83 + .../Pk/CryptPkcs7SignNull.c | 53 + .../Pk/CryptPkcs7VerifyEkuNull.c | 152 + .../Pk/CryptPkcs7VerifyEkuRuntime.c | 56 + .../Pk/CryptPkcs7VerifyNull.c | 163 + .../Pk/CryptPkcs7VerifyRuntime.c | 38 + .../BaseCryptLibMbedTls/Pk/CryptRsaBasic.c | 278 ++ .../Pk/CryptRsaBasicNull.c | 121 + .../BaseCryptLibMbedTls/Pk/CryptRsaExtNull.c | 117 + .../BaseCryptLibMbedTls/Pk/CryptRsaPss.c | 174 + .../BaseCryptLibMbedTls/Pk/CryptRsaPssNull.c | 46 + .../Pk/CryptRsaPssSignNull.c | 60 + .../BaseCryptLibMbedTls/Pk/CryptTsNull.c | 42 + .../BaseCryptLibMbedTls/Pk/CryptX509Null.c | 753 ++++ .../BaseCryptLibMbedTls/Rand/CryptRandNull.c | 56 + .../BaseCryptLibMbedTls/RuntimeCryptLib.inf | 92 + .../BaseCryptLibMbedTls/RuntimeCryptLib.uni | 22 + .../BaseCryptLibMbedTls/SecCryptLib.inf | 84 + .../BaseCryptLibMbedTls/SecCryptLib.uni | 17 + .../BaseCryptLibMbedTls/SmmCryptLib.inf | 92 + .../BaseCryptLibMbedTls/SmmCryptLib.uni | 22 + .../SysCall/ConstantTimeClock.c | 75 + .../BaseCryptLibMbedTls/SysCall/CrtWrapper.c | 58 + .../SysCall/RuntimeMemAllocation.c | 462 ++ .../SysCall/TimerWrapper.c | 198 + .../BaseCryptLibMbedTls/TestBaseCryptLib.inf | 76 + CryptoPkg/Library/Include/stdint.h | 19 + CryptoPkg/Library/Include/stubs-32.h | 9 + CryptoPkg/Library/MbedTlsLib/CrtWrapper.c | 96 + CryptoPkg/Library/MbedTlsLib/EcSm2Null.c | 495 +++ .../Include/mbedtls/mbedtls_config.h | 3823 +++++++++++++++++ CryptoPkg/Library/MbedTlsLib/MbedTlsLib.inf | 171 + .../Library/MbedTlsLib/MbedTlsLibFull.inf | 175 + CryptoPkg/Library/MbedTlsLib/mbedtls | 1 + CryptoPkg/Private/Library/MbedTlsLib.h | 12 + CryptoPkg/Readme.md | 16 +- .../UnitTest/Library/BaseCryptLib/HashTests.c | 33 +- .../UnitTest/Library/BaseCryptLib/HmacTests.c | 60 +- .../UnitTest/Library/BaseCryptLib/RsaTests.c | 10 + 73 files changed, 14446 insertions(+), 24 deletions(-) create mode 100644= CryptoPkg/CryptoPkgMbedTls.dsc create mode 100644 CryptoPkg/Library/BaseC= ryptLibMbedTls/BaseCryptLib.inf create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Bn/CryptBnNull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Cipher/CryptAeadA= esGcmNull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Cipher/CryptAes.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Cipher/CryptAesNu= ll.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptMd5.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptMd5Null= .c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptParalle= lHashNull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha1.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha1Nul= l.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha256.= c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha256N= ull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha512.= c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSha512N= ull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hash/CryptSm3Null= .c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hmac/CryptHmac.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Hmac/CryptHmacNul= l.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/InternalCryptLib.= h create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Kdf/CryptHkdf.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Kdf/CryptHkdfNull= .c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/PeiCryptLib.inf create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/PeiCryptLib.uni create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pem/CryptPemNull.= c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptAuthentic= odeNull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptDhNull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptEcNull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs1Oaep= Null.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs5Pbkd= f2Null.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7Inte= rnal.h create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7Sign= Null.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7Veri= fyEkuNull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7Veri= fyEkuRuntime.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7Veri= fyNull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptPkcs7Veri= fyRuntime.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaBasic.= c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaBasicN= ull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaExtNul= l.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaPss.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaPssNul= l.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptRsaPssSig= nNull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptTsNull.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Pk/CryptX509Null.= c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/Rand/CryptRandNul= l.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/RuntimeCryptLib.i= nf create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/RuntimeCryptLib.u= ni create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SecCryptLib.inf create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SecCryptLib.uni create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SmmCryptLib.inf create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SmmCryptLib.uni create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SysCall/ConstantT= imeClock.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SysCall/CrtWrappe= r.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SysCall/RuntimeMe= mAllocation.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/SysCall/TimerWrap= per.c create mode 100644 CryptoPkg/Library/BaseCryptLibMbedTls/TestBaseCryptLib.= inf create mode 100644 CryptoPkg/Library/Include/stdint.h create mode 100644 CryptoPkg/Library/Include/stubs-32.h create mode 100644 CryptoPkg/Library/MbedTlsLib/CrtWrapper.c create mode 100644 CryptoPkg/Library/MbedTlsLib/EcSm2Null.c create mode 100644 CryptoPkg/Library/MbedTlsLib/Include/mbedtls/mbedtls_co= nfig.h create mode 100644 CryptoPkg/Library/MbedTlsLib/MbedTlsLib.inf create mode 100644 CryptoPkg/Library/MbedTlsLib/MbedTlsLibFull.inf create mode 160000 CryptoPkg/Library/MbedTlsLib/mbedtls create mode 100644 CryptoPkg/Private/Library/MbedTlsLib.h -- 2.26.2.windows.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#109384): https://edk2.groups.io/g/devel/message/109384 Mute This Topic: https://groups.io/mt/101639971/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-