From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pg1-f171.google.com (mail-pg1-f171.google.com [209.85.215.171]) by mx.groups.io with SMTP id smtpd.web08.493.1657156220886846334 for ; Wed, 06 Jul 2022 18:10:21 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20210112 header.b=UKUBv1yJ; spf=pass (domain: gmail.com, ip: 209.85.215.171, mailfrom: kuqin12@gmail.com) Received: by mail-pg1-f171.google.com with SMTP id bh13so9754437pgb.4 for ; Wed, 06 Jul 2022 18:10:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=message-id:date:mime-version:user-agent:subject:content-language:to :cc:references:from:in-reply-to; bh=AmPgr5mSNEVQPhex4Vz5Xmy5/RxUKk56fzA2uY5saeo=; b=UKUBv1yJ6exmwBw2twujQsL6iTLSx/RpYUvXMRYMm0ka2e0gf1pM9alGYNxKGiwq0K Z+XEfat0DOOpAUfk/DxU9EwUUDmt4B822BE5fT1kHDC0e3cfOctc65H7W0cw27SjxbC7 zQlTl60gk3sl1uuY10CoJdc8xkZfvXnQwoZRx1pCtwbVbtSntvlzmxhiEX9kh8lKBDh2 lw/xBXmW4Bej/gMVFAYHXu2r+rH/z37JGkj6O5KpJ4IEanQDAxcGD5JSeR9S+UU0R9fv 81OZgYrcwDE69FI1NAI+hmzbbY0EPeR/EnlwO0s64bvjiW2SosDLyj3I1H6Ya1UPBSfY mq7g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:message-id:date:mime-version:user-agent:subject :content-language:to:cc:references:from:in-reply-to; bh=AmPgr5mSNEVQPhex4Vz5Xmy5/RxUKk56fzA2uY5saeo=; b=IS9jPIAJhzk65u2mDIxBwCeoQYr0vysTnnbXclkNdS5vTOvUYkoFA9NFyI+/ozpWZL gKV4TicZmo1TqxG5ljD7PS9CEI4fxMnUGTYXg44MY4+0d/Woxfq/j3kpKXQlt2mRedmk E5ZauktDsz1552DCG1UNhiZRuZqTfavyzTWIi9MOji1zA3xpm4U5vFyNjZNEgktdpVpv kSO1gx+U0QABTHE0hWjHmBcKSDHKJFQdWkcjZKsQRNW6B2+bDHDLSGsKkz2x2hP8acLL 1mNNpL8zWc8z/j8vHu80kR/GfXQSB4YvT4nQepJNW7j+v/T70J3krWphjTX+TtXjbz+8 Pzdg== X-Gm-Message-State: AJIora9PaYJyx3qLeP5b72AiklAiKXhdgutAE9uJWBe8nJQTQ8L6/mPL 0psTczO5yjOS54w2+3xTVFFC8N3JS4M= X-Google-Smtp-Source: AGRyM1sqGJMKj1q+ZODmaHnNpzsv1euX4UKHGku9JQxlan8wHY9hquCxinVToKRzdTzMiSe68ChFGA== X-Received: by 2002:a17:902:e945:b0:16b:f802:1660 with SMTP id b5-20020a170902e94500b0016bf8021660mr9959474pll.7.1657156219937; Wed, 06 Jul 2022 18:10:19 -0700 (PDT) Return-Path: Received: from ?IPV6:2001:4898:d8:33:60eb:d662:ee8f:5777? ([2001:4898:80e8:a:e103:d662:ee8f:5777]) by smtp.gmail.com with ESMTPSA id d11-20020a170902cecb00b0016bde4cc505sm8384597plg.131.2022.07.06.18.10.19 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 06 Jul 2022 18:10:19 -0700 (PDT) Message-ID: Date: Wed, 6 Jul 2022 18:10:19 -0700 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.11.0 Subject: Re: [edk2-devel] [PATCH v3 00/11] Enhance Secure Boot Variable Libraries To: devel@edk2.groups.io, jiewen.yao@intel.com Cc: "Wang, Jian J" , "Xu, Min M" , Sean Brogan , Ard Biesheuvel , "Justen, Jordan L" , Gerd Hoffmann , Rebecca Cran , Peter Grehan , "Boeuf, Sebastien" , Andrew Fish , "Ni, Ray" References: <20220630235341.1746-1-kuqin12@gmail.com> <6769a533-64a8-e920-cce7-b228dbac2f92@gmail.com> From: "Kun Qin" In-Reply-To: Content-Type: multipart/alternative; boundary="------------KAfmcyqEOt88CkZkptNAkeqS" Content-Language: en-US --------------KAfmcyqEOt88CkZkptNAkeqS Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Thank you so much for the help, Jiewen! On 7/6/2022 6:09 PM, Yao, Jiewen wrote: > > Merged https://github.com/tianocore/edk2/pull/3050 > > *From:* Kun Qin > *Sent:* Thursday, July 7, 2022 1:44 AM > *To:* devel@edk2.groups.io; Yao, Jiewen > *Cc:* Wang, Jian J ; Xu, Min M > ; Sean Brogan ; Ard > Biesheuvel ; Justen, Jordan L > ; Gerd Hoffmann ; > Rebecca Cran ; Peter Grehan ; > Boeuf, Sebastien ; Andrew Fish > ; Ni, Ray > *Subject:* Re: [edk2-devel] [PATCH v3 00/11] Enhance Secure Boot > Variable Libraries > > Hi Jiewen, > > Yes, the "https://github.com/kuqin12/edk2/tree/secure_boot_enhance_v3" > is the > branch I generate these patch series. And they have not been changed > after sending v3 patches. > > I confirm that: > 1. the latest update 256220d82191effae32d91897ab0f65a4fa0641b is > identical to the one I submitted to mailing list; > 2. the branch passed EDKII CI when I prepared this branch and the PR > is Secure boot enhance v3 by kuqin12 · Pull Request #3035 · > tianocore/edk2 (github.com) . > > Thanks a lot for the help! Please let me know if you encounter any > issues when merging these patches. > > Regards, > Kun > > On 7/5/2022 10:19 PM, Yao, Jiewen wrote: > > Hi > > I am going to merge this. However, I realize that my mailbox filtered patch 6/11 and 10/11. > > So I am going to merge the one inhttps://github.com/kuqin12/edk2/tree/secure_boot_enhance_v3 > > Please double confirm: > > 1) the latest one 256220d82191effae32d91897ab0f65a4fa0641b is identical to the one you submitted to EDKII mailing list. > > 2) the latest one passed the EDKII CI. > > Once you confirm above, I will start merging process. > > Thank you > > Yao Jiewen > > -----Original Message----- > > From:devel@edk2.groups.io On Behalf Of Kun Qin > > Sent: Friday, July 1, 2022 7:54 AM > > To:devel@edk2.groups.io > > Cc: Yao, Jiewen ; Wang, Jian J ; > > Xu, Min M ; Sean Brogan ; > > Ard Biesheuvel ; Justen, Jordan L > > ; Gerd Hoffmann ; Rebecca > > Cran ; Peter Grehan ; Boeuf, > > Sebastien ; Andrew Fish ; Ni, > > Ray > > Subject: [edk2-devel] [PATCH v3 00/11] Enhance Secure Boot Variable Libraries > > REF:https://bugzilla.tianocore.org/show_bug.cgi?id=3909 > > REF:https://bugzilla.tianocore.org/show_bug.cgi?id=3910 > > REF:https://bugzilla.tianocore.org/show_bug.cgi?id=3911 > > This is a follow-up of a previously submitted patch series based on top > > of master branch:https://edk2.groups.io/g/devel/message/90491. > > The main changes between v2 and v3 patches are: > >   - Added reviewed-by and acked-by tags collected from previous iteration > >   - Updated default timestamp for default secure boot variable enrollment > > The updated changes are verified on QEMU based Q35 virtual platform as > > well as proprietary physical platforms. > > Patch v3 branch: > > https://github.com/kuqin12/edk2/tree/secure_boot_enhance_v3 > > Cc: Jiewen Yao > > Cc: Jian J Wang > > Cc: Min Xu > > Cc: Sean Brogan > > Cc: Ard Biesheuvel > > Cc: Jordan Justen > > Cc: Gerd Hoffmann > > Cc: Rebecca Cran > > Cc: Peter Grehan > > Cc: Sebastien Boeuf > > Cc: Andrew Fish > > Cc: Ray Ni > > Kun Qin (8): > >   SecurityPkg: UefiSecureBoot: Definitions of cert and payload > >     structures > >   SecurityPkg: PlatformPKProtectionLib: Added PK protection interface > >   SecurityPkg: SecureBootVariableLib: Updated time based payload creator > >   SecurityPkg: SecureBootVariableProvisionLib: Updated implementation > >   SecurityPkg: Secure Boot Drivers: Added common header files > >   SecurityPkg: SecureBootConfigDxe: Updated invocation pattern > >   OvmfPkg: Pipeline: Resolve SecureBootVariableLib dependency > >   EmulatorPkg: Pipeline: Resolve SecureBootVariableLib dependency > > kuqin (3): > >   SecurityPkg: SecureBootVariableLib: Updated signature list creator > >   SecurityPkg: SecureBootVariableLib: Added newly supported interfaces > >   SecurityPkg: SecureBootVariableLib: Added unit tests > > SecurityPkg/EnrollFromDefaultKeysApp/EnrollFromDefaultKeysApp.c > > |    1 + > > SecurityPkg/Library/PlatformPKProtectionLibVarPolicy/PlatformPKProtectionLib > > VarPolicy.c   |   51 + > > SecurityPkg/Library/SecureBootVariableLib/SecureBootVariableLib.c > > |  485 ++++- > > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockPlatformPKProtectio > > nLib.c          |   36 + > > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiLib.c > > |  201 ++ > > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiRuntimeServices > > TableLib.c      |   13 + > > SecurityPkg/Library/SecureBootVariableLib/UnitTest/SecureBootVariableLibUnit > > Test.c        | 2037 ++++++++++++++++++++ > > SecurityPkg/Library/SecureBootVariableProvisionLib/SecureBootVariableProvisi > > onLib.c       |  145 +- > > SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigIm > > pl.c              |  128 +- > > SecurityPkg/VariableAuthenticated/SecureBootDefaultKeysDxe/SecureBootDefa > > ultKeysDxe.c     |    1 + > > EmulatorPkg/EmulatorPkg.dsc                                                               |    1 + > > OvmfPkg/Bhyve/BhyveX64.dsc                                                                |    1 + > > OvmfPkg/CloudHv/CloudHvX64.dsc                                                            |    1 + > > OvmfPkg/IntelTdx/IntelTdxX64.dsc                                                          |    1 + > > OvmfPkg/OvmfPkgIa32.dsc                                                                   |    1 + > > OvmfPkg/OvmfPkgIa32X64.dsc                                                                |    1 + > > OvmfPkg/OvmfPkgX64.dsc                                                                    |    1 + > > SecurityPkg/Include/Library/PlatformPKProtectionLib.h                                     | > > 31 + > > SecurityPkg/Include/Library/SecureBootVariableLib.h                                       | > > 103 +- > > SecurityPkg/Include/UefiSecureBoot.h                                                      |   94 + > > SecurityPkg/Library/PlatformPKProtectionLibVarPolicy/PlatformPKProtectionLib > > VarPolicy.inf |   36 + > > SecurityPkg/Library/SecureBootVariableLib/SecureBootVariableLib.inf > > |   14 +- > > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockPlatformPKProtectio > > nLib.inf        |   33 + > > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiLib.inf > > |   45 + > > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiRuntimeServices > > TableLib.inf    |   25 + > > SecurityPkg/Library/SecureBootVariableLib/UnitTest/SecureBootVariableLibUnit > > Test.inf      |   36 + > > SecurityPkg/SecurityPkg.ci.yaml                                                           |   11 + > > SecurityPkg/SecurityPkg.dec                                                               |    5 + > > SecurityPkg/SecurityPkg.dsc                                                               |    2 + > > SecurityPkg/Test/SecurityPkgHostTest.dsc                                                  |   38 + > > SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDx > > e.inf             |    1 + > > 31 files changed, 3467 insertions(+), 112 deletions(-) > > create mode 100644 > > SecurityPkg/Library/PlatformPKProtectionLibVarPolicy/PlatformPKProtectionLib > > VarPolicy.c > > create mode 100644 > > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockPlatformPKProtectio > > nLib.c > > create mode 100644 > > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiLib.c > > create mode 100644 > > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiRuntimeServices > > TableLib.c > > create mode 100644 > > SecurityPkg/Library/SecureBootVariableLib/UnitTest/SecureBootVariableLibUnit > > Test.c > > create mode 100644 SecurityPkg/Include/Library/PlatformPKProtectionLib.h > > create mode 100644 SecurityPkg/Include/UefiSecureBoot.h > > create mode 100644 > > SecurityPkg/Library/PlatformPKProtectionLibVarPolicy/PlatformPKProtectionLib > > VarPolicy.inf > > create mode 100644 > > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockPlatformPKProtectio > > nLib.inf > > create mode 100644 > > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiLib.inf > > create mode 100644 > > SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiRuntimeServices > > TableLib.inf > > create mode 100644 > > SecurityPkg/Library/SecureBootVariableLib/UnitTest/SecureBootVariableLibUnit > > Test.inf > > create mode 100644 SecurityPkg/Test/SecurityPkgHostTest.dsc > > -- > > 2.36.0.windows.1 > > --------------KAfmcyqEOt88CkZkptNAkeqS Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: 8bit

Thank you so much for the help, Jiewen!

On 7/6/2022 6:09 PM, Yao, Jiewen wrote:

Merged https://github.com/tianocore/edk2/pull/3050

 

From: Kun Qin <kuqin12@gmail.com>
Sent: Thursday, July 7, 2022 1:44 AM
To: devel@edk2.groups.io; Yao, Jiewen <jiewen.yao@intel.com>
Cc: Wang, Jian J <jian.j.wang@intel.com>; Xu, Min M <min.m.xu@intel.com>; Sean Brogan <sean.brogan@microsoft.com>; Ard Biesheuvel <ardb+tianocore@kernel.org>; Justen, Jordan L <jordan.l.justen@intel.com>; Gerd Hoffmann <kraxel@redhat.com>; Rebecca Cran <rebecca@bsdio.com>; Peter Grehan <grehan@freebsd.org>; Boeuf, Sebastien <sebastien.boeuf@intel.com>; Andrew Fish <afish@apple.com>; Ni, Ray <ray.ni@intel.com>
Subject: Re: [edk2-devel] [PATCH v3 00/11] Enhance Secure Boot Variable Libraries

 

Hi Jiewen,

Yes, the "https://github.com/kuqin12/edk2/tree/secure_boot_enhance_v3" is the branch I generate these patch series. And they have not been changed after sending v3 patches.

I confirm that:
1. the latest update 256220d82191effae32d91897ab0f65a4fa0641b is identical to the one I submitted to mailing list;
2. the branch passed EDKII CI when I prepared this branch and the PR is Secure boot enhance v3 by kuqin12 · Pull Request #3035 · tianocore/edk2 (github.com).

Thanks a lot for the help! Please let me know if you encounter any issues when merging these patches.

Regards,
Kun

On 7/5/2022 10:19 PM, Yao, Jiewen wrote:

Hi
I am going to merge this. However, I realize that my mailbox filtered patch 6/11 and 10/11.
So I am going to merge the one in https://github.com/kuqin12/edk2/tree/secure_boot_enhance_v3 
 
Please double confirm:
1) the latest one 256220d82191effae32d91897ab0f65a4fa0641b is identical to the one you submitted to EDKII mailing list.
2) the latest one passed the EDKII CI.
 
Once you confirm above, I will start merging process.
 
Thank you
Yao Jiewen
 
-----Original Message-----
From: devel@edk2.groups.io <devel@edk2.groups.io> On Behalf Of Kun Qin
Sent: Friday, July 1, 2022 7:54 AM
To: devel@edk2.groups.io
Cc: Yao, Jiewen <jiewen.yao@intel.com>; Wang, Jian J <jian.j.wang@intel.com>;
Xu, Min M <min.m.xu@intel.com>; Sean Brogan <sean.brogan@microsoft.com>;
Ard Biesheuvel <ardb+tianocore@kernel.org>; Justen, Jordan L
<jordan.l.justen@intel.com>; Gerd Hoffmann <kraxel@redhat.com>; Rebecca
Cran <rebecca@bsdio.com>; Peter Grehan <grehan@freebsd.org>; Boeuf,
Sebastien <sebastien.boeuf@intel.com>; Andrew Fish <afish@apple.com>; Ni,
Ray <ray.ni@intel.com>
Subject: [edk2-devel] [PATCH v3 00/11] Enhance Secure Boot Variable Libraries
 
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3909
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3910
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3911
 
This is a follow-up of a previously submitted patch series based on top
of master branch: https://edk2.groups.io/g/devel/message/90491.
 
The main changes between v2 and v3 patches are:
  - Added reviewed-by and acked-by tags collected from previous iteration
  - Updated default timestamp for default secure boot variable enrollment
 
The updated changes are verified on QEMU based Q35 virtual platform as
well as proprietary physical platforms.
 
Patch v3 branch:
https://github.com/kuqin12/edk2/tree/secure_boot_enhance_v3
 
Cc: Jiewen Yao <jiewen.yao@intel.com>
Cc: Jian J Wang <jian.j.wang@intel.com>
Cc: Min Xu <min.m.xu@intel.com>
Cc: Sean Brogan <sean.brogan@microsoft.com>
Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>
Cc: Jordan Justen <jordan.l.justen@intel.com>
Cc: Gerd Hoffmann <kraxel@redhat.com>
Cc: Rebecca Cran <rebecca@bsdio.com>
Cc: Peter Grehan <grehan@freebsd.org>
Cc: Sebastien Boeuf <sebastien.boeuf@intel.com>
Cc: Andrew Fish <afish@apple.com>
Cc: Ray Ni <ray.ni@intel.com>
 
Kun Qin (8):
  SecurityPkg: UefiSecureBoot: Definitions of cert and payload
    structures
  SecurityPkg: PlatformPKProtectionLib: Added PK protection interface
  SecurityPkg: SecureBootVariableLib: Updated time based payload creator
  SecurityPkg: SecureBootVariableProvisionLib: Updated implementation
  SecurityPkg: Secure Boot Drivers: Added common header files
  SecurityPkg: SecureBootConfigDxe: Updated invocation pattern
  OvmfPkg: Pipeline: Resolve SecureBootVariableLib dependency
  EmulatorPkg: Pipeline: Resolve SecureBootVariableLib dependency
 
kuqin (3):
  SecurityPkg: SecureBootVariableLib: Updated signature list creator
  SecurityPkg: SecureBootVariableLib: Added newly supported interfaces
  SecurityPkg: SecureBootVariableLib: Added unit tests
 
 SecurityPkg/EnrollFromDefaultKeysApp/EnrollFromDefaultKeysApp.c
|    1 +
 
SecurityPkg/Library/PlatformPKProtectionLibVarPolicy/PlatformPKProtectionLib
VarPolicy.c   |   51 +
 SecurityPkg/Library/SecureBootVariableLib/SecureBootVariableLib.c
|  485 ++++-
 
SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockPlatformPKProtectio
nLib.c          |   36 +
 SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiLib.c
|  201 ++
 
SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiRuntimeServices
TableLib.c      |   13 +
 
SecurityPkg/Library/SecureBootVariableLib/UnitTest/SecureBootVariableLibUnit
Test.c        | 2037 ++++++++++++++++++++
 
SecurityPkg/Library/SecureBootVariableProvisionLib/SecureBootVariableProvisi
onLib.c       |  145 +-
 
SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigIm
pl.c              |  128 +-
 
SecurityPkg/VariableAuthenticated/SecureBootDefaultKeysDxe/SecureBootDefa
ultKeysDxe.c     |    1 +
 EmulatorPkg/EmulatorPkg.dsc                                                               |    1 +
 OvmfPkg/Bhyve/BhyveX64.dsc                                                                |    1 +
 OvmfPkg/CloudHv/CloudHvX64.dsc                                                            |    1 +
 OvmfPkg/IntelTdx/IntelTdxX64.dsc                                                          |    1 +
 OvmfPkg/OvmfPkgIa32.dsc                                                                   |    1 +
 OvmfPkg/OvmfPkgIa32X64.dsc                                                                |    1 +
 OvmfPkg/OvmfPkgX64.dsc                                                                    |    1 +
 SecurityPkg/Include/Library/PlatformPKProtectionLib.h                                     |
31 +
 SecurityPkg/Include/Library/SecureBootVariableLib.h                                       |
103 +-
 SecurityPkg/Include/UefiSecureBoot.h                                                      |   94 +
 
SecurityPkg/Library/PlatformPKProtectionLibVarPolicy/PlatformPKProtectionLib
VarPolicy.inf |   36 +
 SecurityPkg/Library/SecureBootVariableLib/SecureBootVariableLib.inf
|   14 +-
 
SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockPlatformPKProtectio
nLib.inf        |   33 +
 SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiLib.inf
|   45 +
 
SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiRuntimeServices
TableLib.inf    |   25 +
 
SecurityPkg/Library/SecureBootVariableLib/UnitTest/SecureBootVariableLibUnit
Test.inf      |   36 +
 SecurityPkg/SecurityPkg.ci.yaml                                                           |   11 +
 SecurityPkg/SecurityPkg.dec                                                               |    5 +
 SecurityPkg/SecurityPkg.dsc                                                               |    2 +
 SecurityPkg/Test/SecurityPkgHostTest.dsc                                                  |   38 +
 
SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDx
e.inf             |    1 +
 31 files changed, 3467 insertions(+), 112 deletions(-)
 create mode 100644
SecurityPkg/Library/PlatformPKProtectionLibVarPolicy/PlatformPKProtectionLib
VarPolicy.c
 create mode 100644
SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockPlatformPKProtectio
nLib.c
 create mode 100644
SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiLib.c
 create mode 100644
SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiRuntimeServices
TableLib.c
 create mode 100644
SecurityPkg/Library/SecureBootVariableLib/UnitTest/SecureBootVariableLibUnit
Test.c
 create mode 100644 SecurityPkg/Include/Library/PlatformPKProtectionLib.h
 create mode 100644 SecurityPkg/Include/UefiSecureBoot.h
 create mode 100644
SecurityPkg/Library/PlatformPKProtectionLibVarPolicy/PlatformPKProtectionLib
VarPolicy.inf
 create mode 100644
SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockPlatformPKProtectio
nLib.inf
 create mode 100644
SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiLib.inf
 create mode 100644
SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiRuntimeServices
TableLib.inf
 create mode 100644
SecurityPkg/Library/SecureBootVariableLib/UnitTest/SecureBootVariableLibUnit
Test.inf
 create mode 100644 SecurityPkg/Test/SecurityPkgHostTest.dsc
 
--
2.36.0.windows.1
 
 
 
 
 
 
 
 
 
 
--------------KAfmcyqEOt88CkZkptNAkeqS--