Cool Thanks

thank you!
Yao, Jiewen


> 在 2019年5月21日,上午9:58,Desai, Imran <imran.de...@intel.com> 写道:
> 
> Hello Jiewen,
> 
> I tested SM3 PCR extensions on the OvmfPkg using swTPM (and TPM2 simulator).
> The validation was done comparing PCR extensions from the TCG2 EventLog and 
> SM3 PCR Bank data from the simulator at every extension.
> Additionally each SM3 extension and resulting values were compared and 
> contrasted against OpenSSL_1_1_1b on a linux dev machine to ensure the 
> accuracy of the digest values being produced, extended and realized as a 
> final value in the PCR.
> 
> Thanks and Regards,
> 
> Imran Desai
> ________________________________________
> From: Yao, Jiewen
> Sent: Monday, May 20, 2019 9:30 AM
> To: devel@edk2.groups.io; Desai, Imran
> Subject: Re: [edk2-devel] [Enable measured boot with SM3 digest algorithm 0/4]
> 
> hi
> thanks for this contribution
> Besides the comment from Laszlo, would you please also share your unit test 
> result?
> What test you have done for this patch?
> 
> thank you!
> Yao, Jiewen
> 
> 
>> 在 2019年5月17日,下午2:43,Imran Desai <imran.de...@intel.com> 写道:
>> 
>> https://github.com/idesai/edk2/tree/enable_sm3_measured_boot
>> 
>> Support for SM3 digest algorithm is needed for TPM with SM3 PCR banks. This 
>> digest algorithm is part of the China Crypto algorithm suite. Support for 
>> these algorithms is needed to enable platforms for the PRC market.
>> This integration has dependency on the openssl_1_1_1b integration into edk2.
>> 
>> Imran Desai (4):
>> sm3_enabling: Augment crypt interface with calls into openssl to
>>   calculate sm3 digest prior to exercising TPM2 calls for PCR extend
>> sm3-enabling: Add SM3 TCG algorithm registry value to the
>>   PcdTpm2HashMask
>> sm3-enabling: Add SM3 guid reference in the TPM2 hash mask  structure
>>   in HashLibBaseCryptoRouterCommon.c
>> sm3-enabling: Add SM3 hashinstance library information to all OvmfPkg
>>   and SecurityPkg
>> 
>> SecurityPkg/SecurityPkg.dec                   |   5 +-
>> OvmfPkg/OvmfPkgIa32.dsc                       |   2 +
>> OvmfPkg/OvmfPkgIa32X64.dsc                    |   2 +
>> OvmfPkg/OvmfPkgX64.dsc                        |   2 +
>> SecurityPkg/SecurityPkg.dsc                   |   3 +
>> .../HashInstanceLibSm3/HashInstanceLibSm3.inf |  46 ++++++
>> MdePkg/Include/Protocol/Hash.h                |   5 +
>> SecurityPkg/Include/Library/HashLib.h         |   1 +
>> .../HashInstanceLibSm3/HashInstanceLibSm3.c   | 155 ++++++++++++++++++
>> .../HashLibBaseCryptoRouterCommon.c           |   1 +
>> .../HashInstanceLibSm3/HashInstanceLibSm3.uni |  21 +++
>> 11 files changed, 241 insertions(+), 2 deletions(-)
>> create mode 100644 
>> SecurityPkg/Library/HashInstanceLibSm3/HashInstanceLibSm3.inf
>> create mode 100644 
>> SecurityPkg/Library/HashInstanceLibSm3/HashInstanceLibSm3.c
>> create mode 100644 
>> SecurityPkg/Library/HashInstanceLibSm3/HashInstanceLibSm3.uni
>> 
>> --
>> 2.17.0
>> 
>> 
>> 
>> 

-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.

View/Reply Online (#41161): https://edk2.groups.io/g/devel/message/41161
Mute This Topic: https://groups.io/mt/31659817/21656
Group Owner: devel+ow...@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub  [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to