Thanks Laszlo, below patch did miss that point to avoid the build performance impact.
I will update it to introduce HTTPS_BOOT_ENABLE flag for TlsDxe. Thanks. Jiaxin > -----Original Message----- > From: Laszlo Ersek [mailto:[email protected]] > Sent: Monday, February 29, 2016 11:26 PM > To: Wu, Jiaxin <[email protected]>; [email protected] > Cc: Ye, Ting <[email protected]>; Ni, Ruiyu <[email protected]>; Fu, Siyuan > <[email protected]>; Long, Qin <[email protected]> > Subject: Re: [edk2] [PATCH v2 6/6] Nt32Pkg: Enable Nt32Pkg platform HTTPS > boot feature. > > On 02/29/16 02:37, Jiaxin Wu wrote: > > v2: > > *Update to remove 'SECURE_BOOT_ENABLE' flag for all library defined in > > CryptoPkg. > > > > This path is used to enable HTTPS boot feature. > > > > Cc: Ye Ting <[email protected]> > > Cc: Fu Siyuan <[email protected]> > > Cc: Long Qin <[email protected]> > > Cc: Ruiyu Ni <[email protected]> > > Cc: El-Haj-Mahmoud Samer <[email protected]> > > Contributed-under: TianoCore Contribution Agreement 1.0 > > Signed-off-by: Jiaxin Wu <[email protected]> > > --- > > Nt32Pkg/Nt32Pkg.dsc | 15 ++++++--------- Nt32Pkg/Nt32Pkg.fdf | 4 > > +++- > > 2 files changed, 9 insertions(+), 10 deletions(-) > > > > diff --git a/Nt32Pkg/Nt32Pkg.dsc b/Nt32Pkg/Nt32Pkg.dsc index > > 87a08c0..d297812 100644 > > --- a/Nt32Pkg/Nt32Pkg.dsc > > +++ b/Nt32Pkg/Nt32Pkg.dsc > > @@ -2,11 +2,11 @@ > > # EFI/Framework Emulation Platform with UEFI HII interface supported. > > # > > # The Emulation Platform can be used to debug individual modules, prior > to creating > > # a real platform. This also provides an example for how an DSC is > > created. > > # > > -# Copyright (c) 2006 - 2015, Intel Corporation. All rights > > reserved.<BR> > > +# Copyright (c) 2006 - 2016, Intel Corporation. All rights > > +reserved.<BR> > > # Copyright (c) 2015, Hewlett-Packard Development Company, L.P.<BR> > > # (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR> # > > # This program and the accompanying materials > > # are licensed and made available under the terms and conditions of the > BSD License > > @@ -132,15 +132,16 @@ > > > DebugPrintErrorLevelLib|MdeModulePkg/Library/DxeDebugPrintErrorLevelL > ib/DxeDebugPrintErrorLevelLib.inf > > > PerformanceLib|MdePkg/Library/BasePerformanceLibNull/BasePerformanc > eLibNull.inf > > > DebugAgentLib|MdeModulePkg/Library/DebugAgentLibNull/DebugAgentLi > bNull.inf > > > CpuExceptionHandlerLib|MdeModulePkg/Library/CpuExceptionHandlerLibN > ull/CpuExceptionHandlerLibNull.inf > > LockBoxLib|MdeModulePkg/Library/LockBoxNullLib/LockBoxNullLib.inf > > + IntrinsicLib|CryptoPkg/Library/IntrinsicLib/IntrinsicLib.inf > > + OpensslLib|CryptoPkg/Library/OpensslLib/OpensslLib.inf > > + OpensslTlsLib|CryptoPkg/Library/OpensslLib/OpensslTlsLib.inf > > > > !if $(SECURE_BOOT_ENABLE) == TRUE > > > > PlatformSecureLib|Nt32Pkg/Library/PlatformSecureLib/PlatformSecureLib. > > inf > > - IntrinsicLib|CryptoPkg/Library/IntrinsicLib/IntrinsicLib.inf > > - OpensslLib|CryptoPkg/Library/OpensslLib/OpensslLib.inf > > > TpmMeasurementLib|SecurityPkg/Library/DxeTpmMeasurementLib/DxeTp > mMeasurementLib.inf > > > > AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.in > > f > > !else > > > TpmMeasurementLib|MdeModulePkg/Library/TpmMeasurementLibNull/Tp > mMeasurementLibNull.inf > > > > > AuthVariableLib|MdeModulePkg/Library/AuthVariableLibNull/AuthVariableL > > ibNull.inf > > @@ -174,13 +175,11 @@ > > > > > OemHookStatusCodeLib|MdeModulePkg/Library/OemHookStatusCodeLibN > ull/Oem > > HookStatusCodeLibNull.inf > > > > [LibraryClasses.common.PEIM] > > PcdLib|MdePkg/Library/PeiPcdLib/PeiPcdLib.inf > > > > > OemHookStatusCodeLib|Nt32Pkg/Library/PeiNt32OemHookStatusCodeLib/ > PeiNt > > 32OemHookStatusCodeLib.inf > > -!if $(SECURE_BOOT_ENABLE) == TRUE > > BaseCryptLib|CryptoPkg/Library/BaseCryptLib/PeiCryptLib.inf > > -!endif > > > > [LibraryClasses.common] > > # > > # DXE phase common > > # > > @@ -191,13 +190,12 @@ > > > ReportStatusCodeLib|MdeModulePkg/Library/DxeReportStatusCodeLib/Dx > eReportStatusCodeLib.inf > > > OemHookStatusCodeLib|Nt32Pkg/Library/DxeNt32OemHookStatusCodeLib/ > DxeNt32OemHookStatusCodeLib.inf > > > PeCoffExtraActionLib|Nt32Pkg/Library/DxeNt32PeCoffExtraActionLib/DxeNt > 32PeCoffExtraActionLib.inf > > > ExtractGuidedSectionLib|MdePkg/Library/DxeExtractGuidedSectionLib/DxeE > xtractGuidedSectionLib.inf > > WinNtLib|Nt32Pkg/Library/DxeWinNtLib/DxeWinNtLib.inf > > -!if $(SECURE_BOOT_ENABLE) == TRUE > > BaseCryptLib|CryptoPkg/Library/BaseCryptLib/BaseCryptLib.inf > > -!endif > > + TlsLib|CryptoPkg/Library/TlsLib/TlsLib.inf > > > > [LibraryClasses.common.DXE_CORE] > > HobLib|MdePkg/Library/DxeCoreHobLib/DxeCoreHobLib.inf > > > MemoryAllocationLib|MdeModulePkg/Library/DxeCoreMemoryAllocationLi > b/DxeCoreMemoryAllocationLib.inf > > PcdLib|MdePkg/Library/BasePcdLibNull/BasePcdLibNull.inf > > @@ -214,13 +212,11 @@ > > > > [LibraryClasses.common.DXE_RUNTIME_DRIVER] > > # > > # Runtime > > # > > -!if $(SECURE_BOOT_ENABLE) == TRUE > > BaseCryptLib|CryptoPkg/Library/BaseCryptLib/RuntimeCryptLib.inf > > -!endif > > > > > > > ########################################################## > ############ > > ########## > > # > > # Pcd Section - list of all EDK II PCD Entries defined by this > > Platform # @@ -443,10 +439,11 @@ > > > > NetworkPkg/HttpBootDxe/HttpBootDxe.inf > > NetworkPkg/DnsDxe/DnsDxe.inf > > NetworkPkg/HttpDxe/HttpDxe.inf > > NetworkPkg/HttpUtilitiesDxe/HttpUtilitiesDxe.inf > > + NetworkPkg/TlsDxe/TlsDxe.inf > > > > MdeModulePkg/Universal/BdsDxe/BdsDxe.inf { > > <LibraryClasses> > > > NULL|MdeModulePkg/Library/BmpImageDecoderLib/BmpImageDecoderLib > .inf > > } > > diff --git a/Nt32Pkg/Nt32Pkg.fdf b/Nt32Pkg/Nt32Pkg.fdf index > > a10c12f..aa10ae8 100644 > > --- a/Nt32Pkg/Nt32Pkg.fdf > > +++ b/Nt32Pkg/Nt32Pkg.fdf > > @@ -1,9 +1,9 @@ > > ## @file > > # This is NT32 FDF file with UEFI HII features enabled # -# > > Copyright (c) 2007 - 2015, Intel Corporation. All rights reserved.<BR> > > +# Copyright (c) 2007 - 2016, Intel Corporation. All rights > > +reserved.<BR> > > # (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR> # > > # This program and the accompanying materials > > # are licensed and made available under the terms and conditions of the > BSD License > > # which accompanies this distribution. The full text of the license may > > be > found at > > @@ -260,10 +260,12 @@ INF > > MdeModulePkg/Universal/Network/UefiPxeBcDxe/UefiPxeBcDxe.inf > > INF MdeModulePkg/Universal/Network/IScsiDxe/IScsiDxe.inf > > INF NetworkPkg/HttpBootDxe/HttpBootDxe.inf > > INF NetworkPkg/DnsDxe/DnsDxe.inf > > INF NetworkPkg/HttpDxe/HttpDxe.inf > > INF NetworkPkg/HttpUtilitiesDxe/HttpUtilitiesDxe.inf > > +INF NetworkPkg/TlsDxe/TlsDxe.inf > > + > > > > > ########################################################## > ############ > > ########## > > # > > # FILE statements are provided so that a platform integrator can > > include # complete EFI FFS files, as well as a method for > > constructing FFS files # using curly "{}" brace scoping. The > > following three FILEs are > > > > I remember that it was suggested that HTTPS boot be made independent of > SECURE_BOOT_ENABLE, since these were two separate features. > > However, I think the above patch will make Nt32Pkg impossible to build > without adding OpenSSL to the tree. Is that intentional? > > Should we perhaps introduce a new build flag, like HTTPS_BOOT_ENABLE? > Then the OpenSSL-dependent libraries would be resolved for > HTTPS_BOOT_ENABLE || SECURE_BOOT_ENABLE, and the TLS driver would > only depend on HTTPS_BOOT_ENABLE. > > Just an idea. > > Thanks > Laszlo _______________________________________________ edk2-devel mailing list [email protected] https://lists.01.org/mailman/listinfo/edk2-devel

