-
Notifications
You must be signed in to change notification settings - Fork 48
[Feature]: Support firmware security architecture #1415
Copy link
Copy link
Open
Labels
state:needs-triageNeeds to triaged to determine next stepsNeeds to triaged to determine next stepstype:feature-requestA new feature proposalA new feature proposalurgency:lowLittle to no impactLittle to no impact
Description
Feature Overview
This is a general feature to support firmware security. (I am happy to split to fine granularity)
- Common Crypto support (foundation)
- asymmetric algorithm (RSA, ECDSA, ML-DSA)
- symmetric algorithm (SHA2)
- X.509 certificate
- PKCS7
- Secure Boot Support (defined by UEFI)
- depend on Crypto
- UEFI secure boot
- UEFI auth variable
- PE COFF and Authenticode specification
- Trusted Boot Support (defined by TCG)
- depend on Crypto
- TCG TPM command (TCG TPM2 specification)
- TCG TPM device communication (TCG PTP specification)
- TCG trusted boot (TCG PFP specification)
- TCG API table (TCG ACPI specification)
- TCG UEFI protocol (TCG Protocol specification)
Solution Overview
- Common Crypto support
- rely on existing rust crate
- Secure Boot Support
- add patina_secure_boot or merged to patina_dxe_core
- trusted Boot Support
- add patina_trusted_boot or merged to patina_dxe_core
Alternatives Considered
No response
Urgency
Low
Are you going to implement the feature request?
I will implement the feature
Do you need maintainer feedback?
No maintainer feedback needed
Anything else?
No response
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
state:needs-triageNeeds to triaged to determine next stepsNeeds to triaged to determine next stepstype:feature-requestA new feature proposalA new feature proposalurgency:lowLittle to no impactLittle to no impact