From nobody Mon Feb 9 03:29:58 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+107491+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+107491+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=intel.com ARC-Seal: i=1; a=rsa-sha256; t=1691037532; cv=none; d=zohomail.com; s=zohoarc; b=COXhnwQhgtw8Josorp5qHbXrEW2rfnbCMpRYuHbC8TbO/YCxT2eY/HVFENufbeWTecWnU7zXWV6r9vGPdEt6ZoBzoKkFxDiaCidQVWAA9zGIlTbX+FZNO9GqFjWsnIONLsRq3YUC+PTRPROOA7Fk9wDAbOOZ550Seq6Qv4UhrMM= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1691037532; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To; bh=8grNfUI0AOEPC19e1/kywmW81kfQ5QWxi+gDE6pNKvY=; b=asYfku9bH3qk5LgtzCZhnd2/A6atZfLKYjs+Kx3gRtRoWb+67ceRFzcaOBRX86L3WYFZSi+luqjDjbHWbMMBeypdxYyAsec5RR0AcXBFnEmHf3lj/kwN9WLnVqvEPVIdrHCCQ96pGIG1Go2BcxNE6mEfQwGSkgQsVUUXWxC8Zqg= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+107491+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 169103753233156.0771918203468; Wed, 2 Aug 2023 21:38:52 -0700 (PDT) Return-Path: DKIM-Signature: a=rsa-sha256; bh=d522FKVdqAIn5tabG1A58DWPvB2WtGBJuBCMrzYKXZk=; c=relaxed/simple; d=groups.io; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Transfer-Encoding; s=20140610; t=1691037532; v=1; b=j+78DpEOjLIt+CXFw19YTyb21bBMyEcWOfrn+XMBOYV14Ae59E+hoAuhT2amui+7+qJv4flt jB/BoIMKg14MVUSCtAcU/ufgrhCpnNk6J+wGiR2TQEFpSeQE3p8OQSIA2PC4ERrg/6galsNywQB Il4tapQLBAP35NlNggRacpPk= X-Received: by 127.0.0.2 with SMTP id TwSJYY1788612x6uVWa2excC; Wed, 02 Aug 2023 21:38:52 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.43]) by mx.groups.io with SMTP id smtpd.web10.7306.1691037531078533765 for ; Wed, 02 Aug 2023 21:38:51 -0700 X-IronPort-AV: E=McAfee;i="6600,9927,10790"; a="456141173" X-IronPort-AV: E=Sophos;i="6.01,251,1684825200"; d="scan'208";a="456141173" X-Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Aug 2023 21:38:50 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10790"; a="794848054" X-IronPort-AV: E=Sophos;i="6.01,251,1684825200"; d="scan'208";a="794848054" X-Received: from liyi4-desktop.ccr.corp.intel.com ([10.239.153.10]) by fmsmga008-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Aug 2023 21:38:47 -0700 From: "Li, Yi" To: devel@edk2.groups.io Cc: Yi Li , Jiewen Yao , Xiaoyu Lu , Guomin Jiang Subject: [edk2-devel] [PATCH V2 15/29] CryptoPkg: use UEFI provider as default Date: Thu, 3 Aug 2023 12:37:33 +0800 Message-Id: <2f91259ac3bff46a45cb81e44be6f4087392e104.1691031203.git.yi1.li@intel.com> In-Reply-To: References: MIME-Version: 1.0 Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,yi1.li@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: y6Z1VNzSwXZun3tvFI2qpa0Hx1787277AA= Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1691037533946100004 Content-Type: text/plain; charset="utf-8" Added UEFI provider which removed unused features to optimize the size of openssl3. Signed-off-by: Yi Li Cc: Jiewen Yao Cc: Xiaoyu Lu Cc: Guomin Jiang --- CryptoPkg/Library/OpensslLib/OpensslLib.inf | 1 + .../Library/OpensslLib/OpensslLibAccel.inf | 1 + .../Library/OpensslLib/OpensslLibCrypto.inf | 1 + .../Library/OpensslLib/OpensslLibFull.inf | 1 + .../OpensslLib/OpensslLibFullAccel.inf | 1 + .../Library/OpensslLib/OpensslStub/uefiprov.c | 328 ++++++++++++++++++ 6 files changed, 333 insertions(+) create mode 100644 CryptoPkg/Library/OpensslLib/OpensslStub/uefiprov.c diff --git a/CryptoPkg/Library/OpensslLib/OpensslLib.inf b/CryptoPkg/Librar= y/OpensslLib/OpensslLib.inf index c6f72193e7..270f96ee69 100644 --- a/CryptoPkg/Library/OpensslLib/OpensslLib.inf +++ b/CryptoPkg/Library/OpensslLib/OpensslLib.inf @@ -39,6 +39,7 @@ OpensslStub/rand_pool.c # OpensslStub/SslNull.c OpensslStub/EcSm2Null.c + OpensslStub/uefiprov.c =20 [Packages] MdePkg/MdePkg.dec diff --git a/CryptoPkg/Library/OpensslLib/OpensslLibAccel.inf b/CryptoPkg/L= ibrary/OpensslLib/OpensslLibAccel.inf index 98fcad47dc..3bd3dfd37a 100644 --- a/CryptoPkg/Library/OpensslLib/OpensslLibAccel.inf +++ b/CryptoPkg/Library/OpensslLib/OpensslLibAccel.inf @@ -41,6 +41,7 @@ OpensslStub/rand_pool.c # OpensslStub/SslNull.c OpensslStub/EcSm2Null.c + OpensslStub/uefiprov.c =20 [Sources.IA32] # Autogenerated files list starts here diff --git a/CryptoPkg/Library/OpensslLib/OpensslLibCrypto.inf b/CryptoPkg/= Library/OpensslLib/OpensslLibCrypto.inf index 861f42c3d8..581f556eb2 100644 --- a/CryptoPkg/Library/OpensslLib/OpensslLibCrypto.inf +++ b/CryptoPkg/Library/OpensslLib/OpensslLibCrypto.inf @@ -40,6 +40,7 @@ OpensslStub/rand_pool.c OpensslStub/SslNull.c OpensslStub/EcSm2Null.c + OpensslStub/uefiprov.c =20 [Packages] MdePkg/MdePkg.dec diff --git a/CryptoPkg/Library/OpensslLib/OpensslLibFull.inf b/CryptoPkg/Li= brary/OpensslLib/OpensslLibFull.inf index 7815b5fea1..0011f157eb 100644 --- a/CryptoPkg/Library/OpensslLib/OpensslLibFull.inf +++ b/CryptoPkg/Library/OpensslLib/OpensslLibFull.inf @@ -44,6 +44,7 @@ OpensslStub/rand_pool.c # OpensslStub/SslNull.c # OpensslStub/EcSm2Null.c + OpensslStub/uefiprov.c =20 [Packages] MdePkg/MdePkg.dec diff --git a/CryptoPkg/Library/OpensslLib/OpensslLibFullAccel.inf b/CryptoP= kg/Library/OpensslLib/OpensslLibFullAccel.inf index 0a13bd04bf..fa8aabdccf 100644 --- a/CryptoPkg/Library/OpensslLib/OpensslLibFullAccel.inf +++ b/CryptoPkg/Library/OpensslLib/OpensslLibFullAccel.inf @@ -46,6 +46,7 @@ OpensslStub/rand_pool.c # OpensslStub/SslNull.c # OpensslStub/EcSm2Null.c + OpensslStub/uefiprov.c =20 [Sources.IA32] # Autogenerated files list starts here diff --git a/CryptoPkg/Library/OpensslLib/OpensslStub/uefiprov.c b/CryptoPk= g/Library/OpensslLib/OpensslStub/uefiprov.c new file mode 100644 index 0000000000..40ab7e937c --- /dev/null +++ b/CryptoPkg/Library/OpensslLib/OpensslStub/uefiprov.c @@ -0,0 +1,328 @@ +/** @file + UEFI Openssl provider implementation. + + Copyright (c) 2022, Intel Corporation. All rights reserved.
+ SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#include +#include +#include +#include +#include +#include +#include +#include "prov/bio.h" +#include "prov/provider_ctx.h" +#include "prov/providercommon.h" +#include "prov/implementations.h" +#include "prov/names.h" +#include "prov/provider_util.h" +#include "prov/seeding.h" +#include "internal/nelem.h" +#include "provider_local.h" + +OSSL_provider_init_fn ossl_uefi_provider_init; +const OSSL_PROVIDER_INFO ossl_predefined_providers[] =3D { + { "default", NULL, ossl_uefi_provider_init, NULL, 1 }, + { NULL, NULL, NULL, NULL, 0 } +}; + +/* + * Forward declarations to ensure that interface functions are correctly + * defined. + */ +static OSSL_FUNC_provider_gettable_params_fn deflt_gettable_params; +static OSSL_FUNC_provider_get_params_fn deflt_get_params; +static OSSL_FUNC_provider_query_operation_fn deflt_query; + +#define ALGC(NAMES, FUNC, CHECK) { { NAMES, "provider=3Ddefault", FUNC }, = CHECK } +#define ALG(NAMES, FUNC) ALGC(NAMES, FUNC, NULL) + +/* Functions provided by the core */ +static OSSL_FUNC_core_gettable_params_fn *c_gettable_params =3D NULL; +static OSSL_FUNC_core_get_params_fn *c_get_params =3D NULL; + +/* Parameters we provide to the core */ +static const OSSL_PARAM deflt_param_types[] =3D { + OSSL_PARAM_DEFN(OSSL_PROV_PARAM_NAME, OSSL_PARAM_UTF8_PTR, NULL, 0), + OSSL_PARAM_DEFN(OSSL_PROV_PARAM_VERSION, OSSL_PARAM_UTF8_PTR, NULL, 0), + OSSL_PARAM_DEFN(OSSL_PROV_PARAM_BUILDINFO, OSSL_PARAM_UTF8_PTR, NULL, = 0), + OSSL_PARAM_DEFN(OSSL_PROV_PARAM_STATUS, OSSL_PARAM_INTEGER, NULL, 0), + OSSL_PARAM_END +}; + +static const OSSL_PARAM *deflt_gettable_params(void *provctx) +{ + return deflt_param_types; +} + +static int deflt_get_params(void *provctx, OSSL_PARAM params[]) +{ + OSSL_PARAM *p; + + p =3D OSSL_PARAM_locate(params, OSSL_PROV_PARAM_NAME); + if (p !=3D NULL && !OSSL_PARAM_set_utf8_ptr(p, "OpenSSL Default Provid= er")) + return 0; + p =3D OSSL_PARAM_locate(params, OSSL_PROV_PARAM_VERSION); + if (p !=3D NULL && !OSSL_PARAM_set_utf8_ptr(p, OPENSSL_VERSION_STR)) + return 0; + p =3D OSSL_PARAM_locate(params, OSSL_PROV_PARAM_BUILDINFO); + if (p !=3D NULL && !OSSL_PARAM_set_utf8_ptr(p, OPENSSL_FULL_VERSION_ST= R)) + return 0; + p =3D OSSL_PARAM_locate(params, OSSL_PROV_PARAM_STATUS); + if (p !=3D NULL && !OSSL_PARAM_set_int(p, ossl_prov_is_running())) + return 0; + return 1; +} + +/* + * For the algorithm names, we use the following formula for our primary + * names: + * + * ALGNAME[VERSION?][-SUBNAME[VERSION?]?][-SIZE?][-MODE?] + * + * VERSION is only present if there are multiple versions of + * an alg (MD2, MD4, MD5). It may be omitted if there is only + * one version (if a subsequent version is released in the future, + * we can always change the canonical name, and add the old name + * as an alias). + * + * SUBNAME may be present where we are combining multiple + * algorithms together, e.g. MD5-SHA1. + * + * SIZE is only present if multiple versions of an algorithm exist + * with different sizes (e.g. AES-128-CBC, AES-256-CBC) + * + * MODE is only present where applicable. + * + * We add diverse other names where applicable, such as the names that + * NIST uses, or that are used for ASN.1 OBJECT IDENTIFIERs, or names + * we have used historically. + * + * Algorithm names are case insensitive, but we use all caps in our "canon= ical" + * names for consistency. + */ +static const OSSL_ALGORITHM deflt_digests[] =3D { + /* Our primary name:NIST name[:our older names] */ + { PROV_NAMES_SHA1, "provider=3Ddefault", ossl_sha1_functions }, + { PROV_NAMES_SHA2_224, "provider=3Ddefault", ossl_sha224_functions }, + { PROV_NAMES_SHA2_256, "provider=3Ddefault", ossl_sha256_functions }, + { PROV_NAMES_SHA2_384, "provider=3Ddefault", ossl_sha384_functions }, + { PROV_NAMES_SHA2_512, "provider=3Ddefault", ossl_sha512_functions }, + +#ifndef OPENSSL_NO_SM3 + { PROV_NAMES_SM3, "provider=3Ddefault", ossl_sm3_functions }, +#endif /* OPENSSL_NO_SM3 */ + +#ifndef OPENSSL_NO_MD5 + { PROV_NAMES_MD5, "provider=3Ddefault", ossl_md5_functions }, +#endif /* OPENSSL_NO_MD5 */ + + { PROV_NAMES_NULL, "provider=3Ddefault", ossl_nullmd_functions }, + { NULL, NULL, NULL } +}; + +static const OSSL_ALGORITHM_CAPABLE deflt_ciphers[] =3D { + ALG(PROV_NAMES_NULL, ossl_null_functions), + ALG(PROV_NAMES_AES_256_ECB, ossl_aes256ecb_functions), + ALG(PROV_NAMES_AES_192_ECB, ossl_aes192ecb_functions), + ALG(PROV_NAMES_AES_128_ECB, ossl_aes128ecb_functions), + ALG(PROV_NAMES_AES_256_CBC, ossl_aes256cbc_functions), + ALG(PROV_NAMES_AES_192_CBC, ossl_aes192cbc_functions), + ALG(PROV_NAMES_AES_128_CBC, ossl_aes128cbc_functions), + + ALG(PROV_NAMES_AES_256_CTR, ossl_aes256ctr_functions), + ALG(PROV_NAMES_AES_192_CTR, ossl_aes192ctr_functions), + ALG(PROV_NAMES_AES_128_CTR, ossl_aes128ctr_functions), + + ALG(PROV_NAMES_AES_256_GCM, ossl_aes256gcm_functions), + ALG(PROV_NAMES_AES_192_GCM, ossl_aes192gcm_functions), + ALG(PROV_NAMES_AES_128_GCM, ossl_aes128gcm_functions), + + { { NULL, NULL, NULL }, NULL } +}; +static OSSL_ALGORITHM exported_ciphers[OSSL_NELEM(deflt_ciphers)]; + +static const OSSL_ALGORITHM deflt_macs[] =3D { + { PROV_NAMES_HMAC, "provider=3Ddefault", ossl_hmac_functions }, + { NULL, NULL, NULL } +}; + +static const OSSL_ALGORITHM deflt_kdfs[] =3D { + { PROV_NAMES_HKDF, "provider=3Ddefault", ossl_kdf_hkdf_functions }, + { PROV_NAMES_SSKDF, "provider=3Ddefault", ossl_kdf_sskdf_functions }, + { PROV_NAMES_PBKDF2, "provider=3Ddefault", ossl_kdf_pbkdf2_functions }, + { PROV_NAMES_SSHKDF, "provider=3Ddefault", ossl_kdf_sshkdf_functions }, + { PROV_NAMES_TLS1_PRF, "provider=3Ddefault", ossl_kdf_tls1_prf_functio= ns }, + { NULL, NULL, NULL } +}; + +static const OSSL_ALGORITHM deflt_keyexch[] =3D { +#ifndef OPENSSL_NO_DH + { PROV_NAMES_DH, "provider=3Ddefault", ossl_dh_keyexch_functions }, +#endif +#ifndef OPENSSL_NO_EC + { PROV_NAMES_ECDH, "provider=3Ddefault", ossl_ecdh_keyexch_functions }, +#endif + { PROV_NAMES_TLS1_PRF, "provider=3Ddefault", ossl_kdf_tls1_prf_keyexch= _functions }, + { PROV_NAMES_HKDF, "provider=3Ddefault", ossl_kdf_hkdf_keyexch_functio= ns }, + { NULL, NULL, NULL } +}; + +static const OSSL_ALGORITHM deflt_rands[] =3D { + { PROV_NAMES_CTR_DRBG, "provider=3Ddefault", ossl_drbg_ctr_functions }, + { PROV_NAMES_HASH_DRBG, "provider=3Ddefault", ossl_drbg_hash_functions= }, + { NULL, NULL, NULL } +}; + +static const OSSL_ALGORITHM deflt_signature[] =3D { + { PROV_NAMES_RSA, "provider=3Ddefault", ossl_rsa_signature_functions }, +#ifndef OPENSSL_NO_EC + { PROV_NAMES_ECDSA, "provider=3Ddefault", ossl_ecdsa_signature_functio= ns }, +#endif + + { NULL, NULL, NULL } +}; + +static const OSSL_ALGORITHM deflt_asym_cipher[] =3D { + { PROV_NAMES_RSA, "provider=3Ddefault", ossl_rsa_asym_cipher_functions= }, + { NULL, NULL, NULL } +}; + +static const OSSL_ALGORITHM deflt_keymgmt[] =3D { +#ifndef OPENSSL_NO_DH + { PROV_NAMES_DH, "provider=3Ddefault", ossl_dh_keymgmt_functions, + PROV_DESCS_DH }, + { PROV_NAMES_DHX, "provider=3Ddefault", ossl_dhx_keymgmt_functions, + PROV_DESCS_DHX }, +#endif + + { PROV_NAMES_RSA, "provider=3Ddefault", ossl_rsa_keymgmt_functions, + PROV_DESCS_RSA }, + { PROV_NAMES_RSA_PSS, "provider=3Ddefault", ossl_rsapss_keymgmt_functi= ons, + PROV_DESCS_RSA_PSS }, +#ifndef OPENSSL_NO_EC + { PROV_NAMES_EC, "provider=3Ddefault", ossl_ec_keymgmt_functions, + PROV_DESCS_EC }, +#endif + { PROV_NAMES_TLS1_PRF, "provider=3Ddefault", ossl_kdf_keymgmt_function= s, + PROV_DESCS_TLS1_PRF_SIGN }, + { PROV_NAMES_HKDF, "provider=3Ddefault", ossl_kdf_keymgmt_functions, + PROV_DESCS_HKDF_SIGN }, + + { NULL, NULL, NULL } +}; + +static const OSSL_ALGORITHM deflt_decoder[] =3D { +#define DECODER_PROVIDER "default" +#include "decoders.inc" + { NULL, NULL, NULL } +#undef DECODER_PROVIDER +}; + +static const OSSL_ALGORITHM *deflt_query(void *provctx, int operation_id, + int *no_cache) +{ + *no_cache =3D 0; + switch (operation_id) { + case OSSL_OP_DIGEST: + return deflt_digests; + case OSSL_OP_CIPHER: + return exported_ciphers; + case OSSL_OP_MAC: + return deflt_macs; + case OSSL_OP_KDF: + return deflt_kdfs; + case OSSL_OP_RAND: + return deflt_rands; + case OSSL_OP_KEYMGMT: + return deflt_keymgmt; + case OSSL_OP_KEYEXCH: + return deflt_keyexch; + case OSSL_OP_SIGNATURE: + return deflt_signature; + case OSSL_OP_ASYM_CIPHER: + return deflt_asym_cipher; + case OSSL_OP_DECODER: + return deflt_decoder; + } + return NULL; +} + + +static void deflt_teardown(void *provctx) +{ + BIO_meth_free(ossl_prov_ctx_get0_core_bio_method(provctx)); + ossl_prov_ctx_free(provctx); +} + +/* Functions we provide to the core */ +static const OSSL_DISPATCH deflt_dispatch_table[] =3D { + { OSSL_FUNC_PROVIDER_TEARDOWN, (void (*)(void))deflt_teardown }, + { OSSL_FUNC_PROVIDER_GETTABLE_PARAMS, (void (*)(void))deflt_gettable_p= arams }, + { OSSL_FUNC_PROVIDER_GET_PARAMS, (void (*)(void))deflt_get_params }, + { OSSL_FUNC_PROVIDER_QUERY_OPERATION, (void (*)(void))deflt_query }, + { OSSL_FUNC_PROVIDER_GET_CAPABILITIES, + (void (*)(void))ossl_prov_get_capabilities }, + { 0, NULL } +}; + +OSSL_provider_init_fn ossl_uefi_provider_init; + +int ossl_uefi_provider_init(const OSSL_CORE_HANDLE *handle, + const OSSL_DISPATCH *in, + const OSSL_DISPATCH **out, + void **provctx) +{ + OSSL_FUNC_core_get_libctx_fn *c_get_libctx =3D NULL; + BIO_METHOD *corebiometh; + + if (!ossl_prov_bio_from_dispatch(in) + || !ossl_prov_seeding_from_dispatch(in)) + return 0; + for (; in->function_id !=3D 0; in++) { + switch (in->function_id) { + case OSSL_FUNC_CORE_GETTABLE_PARAMS: + c_gettable_params =3D OSSL_FUNC_core_gettable_params(in); + break; + case OSSL_FUNC_CORE_GET_PARAMS: + c_get_params =3D OSSL_FUNC_core_get_params(in); + break; + case OSSL_FUNC_CORE_GET_LIBCTX: + c_get_libctx =3D OSSL_FUNC_core_get_libctx(in); + break; + default: + /* Just ignore anything we don't understand */ + break; + } + } + + if (c_get_libctx =3D=3D NULL) + return 0; + + /* + * We want to make sure that all calls from this provider that requires + * a library context use the same context as the one used to call our + * functions. We do that by passing it along in the provider context. + * + * This only works for built-in providers. Most providers should + * create their own library context. + */ + if ((*provctx =3D ossl_prov_ctx_new()) =3D=3D NULL + || (corebiometh =3D ossl_bio_prov_init_bio_method()) =3D=3D NU= LL) { + ossl_prov_ctx_free(*provctx); + *provctx =3D NULL; + return 0; + } + ossl_prov_ctx_set0_libctx(*provctx, + (OSSL_LIB_CTX *)c_get_libctx(handle= )); + ossl_prov_ctx_set0_handle(*provctx, handle); + ossl_prov_ctx_set0_core_bio_method(*provctx, corebiometh); + + *out =3D deflt_dispatch_table; + ossl_prov_cache_exported_algorithms(deflt_ciphers, exported_ciphers); + + return 1; +} --=20 2.31.1.windows.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#107491): https://edk2.groups.io/g/devel/message/107491 Mute This Topic: https://groups.io/mt/100520593/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-