No, Tls1.3 is not supported yet:
https://github.com/tianocore/edk2/blob/7142e648416ff5d3eac6c6d607874805f5de0ca8/CryptoPkg/Library/OpensslLib/OpensslGen/include/openssl/configuration-ec.h#L271-L273
We have a BZ to track it but afaik no dedicated folk working on it.
Hi all,
I have a question about the OpenSSL library in CryptoPkg. Does tlsv1.3 support
exist in the current OpensslLib? If not, is there a way to make TLSV1.3 support
possible?
Many thanks.
BR,
Eddie
-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
Merged. https://github.com/tianocore/edk2/pull/5667
Mike
> -Original Message-
> From: Michael Kubacki
> Sent: Monday, May 20, 2024 6:41 PM
> To: Kinney, Michael D ; devel@edk2.groups.io;
> Andrew Fish ; Leif Lindholm ;
> Liming Gao
> Cc: Feng, Bob C ; Joey Vagedes
> ; Rebecca Cran ;
Just wanted to send a reminder that I recommend
https://github.com/tianocore/edk2/pull/5667 be merged to unblock CI for
those that are currently trying to test changes.
Thanks,
Michael
On 5/17/2024 8:10 PM, Kinney, Michael D wrote:
Approved. I agree there is no impact to FW.
Mike
In preparation for the transition to a pull request (PR) contribution
process, I've updated the TianoCore wiki.
- Current official TianoCore wiki:
https://github.com/tianocore/tianocore.github.io/wiki/
- My fork with proposed changes:
https://github.com/makubacki/tianocore.github.io/wiki
*Tools, CI, Code base construction meeting series*
*When:*
Monday, May 20, 2024
4:30pm to 5:30pm
(UTC-07:00) America/Los Angeles
*Where:*
*Reminder: Tools, CI, Code base construction meeting series*
*When:*
Monday, May 20, 2024
4:30pm to 5:30pm
(UTC-07:00) America/Los Angeles
*Where:*
FYI - Since PRs are targeted to be enabled on Friday may 24th we will
host this meeting today to close/align on any concerns.
Look forward to seeing everyone there.
thanks
Sean
On 5/19/2024 4:30 PM, Group Notification wrote:
*Reminder: Tools, CI, Code base construction meeting series*
I can't find patch 1 in the series in my email so putting a few comments
here. I really hope this patch series can wait for PRs so code comments
can more easily be correlated with code change.
Looking at your PR with commit: Allocate Varaible cache buffer in PEI by
td36 · Pull Request #5607
On 5/2/24 09:34, Alexey Kardashevskiy wrote:
CONFIDENTIAL_COMPUTING_GUEST_ATTR is not a simple SEV level anymore
and includes a feature mask since a previous commit.
This fixes AmdMemEncryptionAttrCheck to check the level and feature
correctly and adds DebugSwap support.
Since the actual
On 5/2/24 09:34, Alexey Kardashevskiy wrote:
The SEV-ES DebugSwap feature enables type B swaping of debug registers
on #VMEXIT and makes #DB and DR7 intercepts unnecessary and unwanted.
When DebugSwap is enabled, this stops booting if #VC for #DB or
DB7 read/write occurs as this signals
On 5/2/24 09:34, Alexey Kardashevskiy wrote:
PcdConfidentialComputingGuestAttr so far only contained an SEV mode bit
but there are more other features which do not translate to levels
such as DebugSwap or SecureTsc.
This adds the features mask and the DebugSwap feature bit to a PCD.
Cc: Liming
On 5/2/24 09:34, Alexey Kardashevskiy wrote:
For now we need DebugSwap but others are likely to be needed too.
Cc: Tom Lendacky
Cc: Liming Gao
Cc: Michael D Kinney
Cc: Zhiguang Liu
Signed-off-by: Alexey Kardashevskiy
A recent APM has defined a few more and has slightly different naming
Have you verified that every feature from 2.10 is in edk2?
That includes both the include file content as well as all the
Library/module implementations.
A platform can always update this version value in their tables
if the platform is using a subset of features that are all 2.10
conformant.
[AMD Official Use Only - AMD Internal Distribution Only]
Reviewed-by: Abner Chang
> -Original Message-
> From: Abdul Lateef Attar
> Sent: Monday, May 20, 2024 9:50 PM
> To: devel@edk2.groups.io
> Cc: Attar, AbdulLateef (Abdul Lateef) ; Chang,
> Abner ; Grimes, Paul
> Subject:
PeiBoardInitPreMemLib library provides board-specific
initialization functions for the PEI phase.
Cc: Abner Chang
Cc: Paul Grimes
Signed-off-by: Abdul Lateef Attar
---
.../AMD/AmdMinBoardPkg/AmdMinBoardPkg.dec | 8 +
.../AMD/AmdMinBoardPkg/AmdMinBoardPkg.dsc | 5 +
[AMD Official Use Only - AMD Internal Distribution Only]
Already reviewed internally.
Reviewed-by: Abner Chang
> -Original Message-
> From: Abdul Lateef Attar
> Sent: Monday, May 20, 2024 6:24 PM
> To: devel@edk2.groups.io
> Cc: Attar, AbdulLateef (Abdul Lateef) ; Chang,
> Abner ;
Adds SMBIOS common driver which generates various
tables for AMD platforms.
Cc: Abner Chang
Cc: Paul Grimes
Signed-off-by: Abdul Lateef Attar
---
.../AMD/AmdPlatformPkg/AmdPlatformPkg.dec | 63 -
.../AMD/AmdPlatformPkg/AmdPlatformPkg.dsc | 3 +-
PeiBoardInitPreMemLib library provides board-specific
initialization functions for the PEI phase.
Cc: Abner Chang
Cc: Paul Grimes
Signed-off-by: Abdul Lateef Attar
---
.../AMD/AmdMinBoardPkg/AmdMinBoardPkg.dec | 8 +
.../AMD/AmdMinBoardPkg/AmdMinBoardPkg.dsc | 5 +
PR: https://github.com/tianocore/edk2-platforms/pull/144
V2 delta changes:
Updated the "AmdMinBoardPkg: Implement BoardInitLib for PEI phase" PATCH
with correct .dec and .dsc file.
Cc: Paul Grimes
Cc: Abner Chang
Abdul Lateef Attar (5):
AmdMinBoardPkg: Uncrustify PciHotPlug module
On Fri, 10 May 2024 at 12:08, Dun Tan wrote:
>
> Save MTRR by lockbox in CpuS3DataDxe. In S3 boot,
> The MTRR setting will be restored in S3Resume.c
> in following patches. Then S3Resume.c will wakeup
> all APs to load the MTRR setting. This can avoid
> waking up APs in CpuS3.c.
>
>
Thanks for the review and approval. Could you please help merge this patch to
the upstream? A pull request has been created for this patch:
https://github.com/tianocore/edk2/pull/5644. Thanks.
-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply
Hi Liming,
I haven't created a Bugzilla for this change.
Is a bugzila needed for this patch set? I can create one if needed.
Thanks,
Dun
-Original Message-
From: gaoliming
Sent: Monday, May 20, 2024 9:41 AM
To: devel@edk2.groups.io; Tan, Dun
Cc: Ni, Ray ; Wu, Jiaxin ; 'Ard
Kun,
Good to know that you have no concerns on the patch. The patch set aims to
finalize the unblock memory regions before standalone MM env is launched.
The PeiNotifyPpi() can still notify the PPI callback when the PPI has been
installed already.
Thanks,
Ray
Following 3 patches still require the Reviewed-by from package maintainers of
MdeModulePkg and OvmfPkg.
MdeModulePkg: Add gEdkiiS3MtrrSettingGuid
OvmfPkg: Save MTRR by lockbox in CpuS3DataDxe
MdeModulePkg:Remove MpService2Ppi field in SMM_S3_RESUME_STATE
The patch set is a good move to
I remember ARM platform could have a PEI-less design so that SEC directly
invokes DXE.
So I can imagine that a SEC logic to create the VARIABLE_RUNTIME_CACHE_INFO HOB.
Then it comes to how to calculate the size before bios boots.
I think it's doable.
There are 3 caches. Volatile cache size is
26 matches
Mail list logo