Skip to content

Allow Responder Integrator to specify additional opaque data#3485

Merged
jyao1 merged 1 commit intoDMTF:mainfrom
Li-Aaron:fix-3401
Mar 10, 2026
Merged

Allow Responder Integrator to specify additional opaque data#3485
jyao1 merged 1 commit intoDMTF:mainfrom
Li-Aaron:fix-3401

Conversation

@Li-Aaron
Copy link
Contributor

fix #3401

@Li-Aaron Li-Aaron marked this pull request as ready for review January 23, 2026 11:27
@jyao1
Copy link
Member

jyao1 commented Feb 9, 2026

@steven-bellock would you please review?

* opaque_data buffer.
*
* @retval true OpaqueData field is generated successfully.
* If return true, responder will not generate any opaque data,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If the Integrator provides the opaque data then they must also set the secured_message_version in the session_info, correct?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, that is correct.

Copy link
Contributor

@steven-bellock steven-bellock Feb 13, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

libspdm_set_data currently does not support LIBSPDM_DATA_SESSION_SECURED_MESSAGE_VERSION, so that would need to be expanded.

Copy link
Member

@jyao1 jyao1 Mar 2, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this is not required, because we can rely on libspdm to parse the integrator generated responder opaque data and get the final secured message version.

Otherwise, it is a chicken-egg problem. Session info must be generated AFTER secured message version, while you want set secured message version for a session.


#if (LIBSPDM_ENABLE_CAPABILITY_KEY_EX_CAP) && (LIBSPDM_ENABLE_CAPABILITY_MUT_AUTH_CAP)
#if LIBSPDM_ENABLE_CAPABILITY_KEY_EX_CAP
bool g_generate_key_exchange_opaque_data = false;
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Both true and false passed emu test.


uint8_t m_cxl_tsp_current_psk_session_index = 0xFF;

bool g_generate_psk_exchange_opaque_data = false;
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Both true and false passed emu test.

@jyao1 jyao1 added the 4.0 Issues and features slated for the next major revision of libspdm. label Mar 9, 2026
@jyao1
Copy link
Member

jyao1 commented Mar 9, 2026

@Li-Aaron , please resolve conflict.

fix DMTF#3401

Signed-off-by: Aaron Li <aaron.li@intel.com>
@jyao1 jyao1 merged commit a06720a into DMTF:main Mar 10, 2026
97 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

4.0 Issues and features slated for the next major revision of libspdm.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Allow Responder Integrator to specify additional opaque data during key exchange

3 participants