DMTF's Reference Implementation of SPDM
-
Specifications
The SPDM and secured message libraries follow :
DSP0274 Security Protocol and Data Model (SPDM) Specification (version 1.0.2, version 1.1.3, version 1.2.2 and version 1.3.1)
DSP0277 Secured Messages using SPDM Specification (version 1.0.1, version 1.1.1, version 1.2.0)
MCTP and secured MCTP follow :
DSP0275 Security Protocol and Data Model (SPDM) over MCTP Binding Specification (version 1.0.2)
DSP0276 Secured Messages using SPDM over MCTP Binding Specification (version 1.1.1)
PCIE follows :
PCI Express Base Specification Revision 6.2
CXL follows :
Compute Express Link Specification Revision 3.1
-
Includes libraries that can be used to construct an SPDM Requester and an SPDM Responder.
Refer to the libspdm API for more information.
-
Programming Context
The core libraries in
libspdm/library
require only the C99 freestanding headers and so are suitable for embedded and systems programming. Any functionality beyond the freestanding headers is provided bylibspdm/os_stub
or by the library's Integrator. All statically allocated memory in the core libraries is read-only. The core libraries do not dynamically allocate memory.Refer to programming environment for more information.
-
Implemented Requests and Responses
SPDM 1.0:
GET_VERSION
,GET_CAPABILITIES
,NEGOTIATE_ALGORITHMS
,GET_DIGESTS
,GET_CERTIFICATE
,CHALLENGE
,GET_MEASUREMENTS
, andVENDOR_DEFINED_REQUEST
.SPDM 1.1:
KEY_EXCHANGE
,FINISH
,PSK_EXCHANGE
,PSK_FINISH
,END_SESSION
,HEARTBEAT
,KEY_UPDATE
, andENCAPSULATED
messages.SPDM 1.2:
GET_CSR
,SET_CERTIFICATE
,CHUNK_SEND
, andCHUNK_GET
.SPDM 1.3:
GET_KEY_PAIR_INFO
,SET_KEY_PAIR_INFO
,SUBSCRIBE_EVENT_TYPE
,GET_SUPPORTED_EVENT_TYPES
andGET_MEASUREMENT_EXTENSION_LOG
. Additional SPDM 1.3 messages will be implemented in future releases. -
Cryptography Support
The SPDM library requires cryptolib API, including random number generation, symmetric cryptography, asymmetric cryptography, hash, and message authentication code.
Currently supported algorithms: Hash:SHA2/SHA3/SM3, Signature:RSA-SSA/RSA-PSS/ECDSA/EdDSA/SM2-Sign, KeyExchange:FFDHE/ECDHE/SM2-KeyExchange, AEAD:AES_GCM/ChaCha20Poly1305/SM4_GCM. NOTE: NIST algorithms and Shang-Mi (SM) algorithms should not be mixed together.
The endianness is defined in crypto_endianness.
An Mbed TLS wrapper is included in cryptlib_mbedtls. NOTE: SMx and EdDSA are not supported.
An OpenSSL wrapper is included in cryptlib_openssl. NOTE: SM2-KeyExchange and SM4_GCM are not supported.
libspdm provides support for FIPS 140-3. Refer to libspdm FIPS for more information.
libspdm implements a raw public key format as defined in RFC7250. Refer to libspdm raw public key for more information.
-
Execution Context
Support to build an OS application for spdm_requester_emu and spdm_responder_emu to trace communication between Requester and Responder in spdm-emu.
Support to build an OS application for SPDM validation in SPDM-Responder-Validator and TEE-IO validation in tee-io-validator.
Support to build as part of the NVIDIA Linux kernel module driver in open-gpu-kernel-modules.
Support to build as backend server for qemu.
Support is included in UEFI host environment EDKII.
Support to be included in OpenBMC. It is in planning, see SPDM Integration.
Support to be linked by other languages. For example, Java verifier and Rust spdm-utils.
Support interoperability testing with other SPDM implementations. For example, intel-server-prot-spdm and spdm-rs.
-
Supported architecture and cross-compiler based on X64 platform.
Windows System | ia32 | x64 | arm | aarch64 | riscv32 | riscv64 |
---|---|---|---|---|---|---|
VS2015 | cl | cl | - | - | - | - |
VS2019 | cl | cl | - | - | - | - |
VS2022 | cl | cl | - | - | - | - |
ARM_DS2022 | - | - | armclang | armclang | - | - |
GCC | gcc | gcc | - | - | - | - |
CLANG | clang-cl | clang-cl | - | - | - | - |
Linux System | ia32 | x64 | arm | aarch64 | riscv32 | riscv64 |
---|---|---|---|---|---|---|
GCC | gcc | gcc | - | - | - | - |
CLANG | clang | clang | - | - | - | - |
ARM_DS2022 | - | - | armclang | armclang | - | - |
ARM_GNU | - | - | arm-none-linux-gnueabihf-gcc | aarch64-none-linux-gnu-gcc | - | - |
ARM_GNU_BARE_METAL | - | - | arm-none-eabi | aarch64-none-elf | - | - |
ARM_GCC | - | - | arm-linux-gnueabi-gcc | - | - | - |
AARCH64_GCC | - | - | - | aarch64-linux-gnu-gcc | - | - |
RISCV_GNU | - | - | - | - | riscv32-unknown-linux-gnu-gcc | riscv64-unknown-linux-gnu-gcc |
RISCV64_GCC | - | - | - | - | - | riscv64-linux-gnu-gcc |
RISCV_XPACK | - | - | - | - | riscv-none-elf-gcc | riscv-none-elf-gcc |
RISCV_NONE | - | - | - | - | riscv64-elf-gcc | riscv64-elf-gcc |
- Static Analysis
Support Coverity scan tool.
Support CodeQL tool.
-
Presentation
Open Source Firmware Conference 2020 - openspdm
Free and Open Source Developers European Meeting 2021 - openspdm
-
Library Threat Model
The threat model can be found at threat_model.
-
Library Design
The detailed design can be found at design.
-
User Guide
The user guide can be found at user_guide.
-
Compiler for IA32/X64 (Choose one)
a) Visual Studio 2022, Visual Studio 2019, Visual Studio 2015
b) LLVM (LLVM13)
- Install LLVM-13.0.0-win64.exe. Change the LLVM install path to
C:\LLVM
, and add LLVM pathC:\LLVM\bin
in PATH environment for CLANG build on Windows. - LLVM13 works good for clang and libfuzzer build. Other versions are not validated for clang build.
- The Visual Studio is needed for nmake.
- Because the libfuzzer lib path is hard coded in CMakeLists, other versions may fail for libfuzzer build.
- Install LLVM-13.0.0-win64.exe. Change the LLVM install path to
For other architectures, refer to build.
-
Compiler for IA32/X64 (Choose one)
a) GCC (above GCC5)
b) LLVM (above LLVM10)
- Install steps:
sudo apt-get install llvm-10
thensudo apt-get install clang-10
. - Use
llvm-ar -version
andclang -v
to confirm the LLVM version. - If LLVM installation fails or LLVM installation version is low, you can update Linux version to fix the issue.
- Install steps:
For other architectures, refer to build.
- cmocka. Version 1.1.7.
libspdm uses submodules for Mbed TLS, OpenSSL, and cmocka.
To get a fully buildable repository, use git submodule update --init
.
If there is an update for submodules, use git submodule update
.
For ia32 builds, use a x86 Native Tools Command Prompt for Visual Studio...
command prompt.
For x64 builds, use a x64 Native Tools Command Prompt for Visual Studio...
command prompt.
General build steps: (Note the ..
at the end of the cmake command).
cd libspdm
mkdir build
cd build
cmake -G"NMake Makefiles" -DARCH=<x64|ia32> -DTOOLCHAIN=<VS2022|VS2019|VS2015|CLANG> -DTARGET=<Debug|Release> -DCRYPTO=<mbedtls|openssl> ..
nmake copy_sample_key
nmake
Example CMake commands:
cmake -G"NMake Makefiles" -DARCH=x64 -DTOOLCHAIN=VS2019 -DTARGET=Debug -DCRYPTO=mbedtls ..
cmake -G"NMake Makefiles" -DARCH=x64 -DTOOLCHAIN=VS2019 -DTARGET=Release -DCRYPTO=mbedtls ..
cmake -G"NMake Makefiles" -DARCH=x64 -DTOOLCHAIN=VS2019 -DTARGET=Debug -DCRYPTO=openssl ..
cmake -G"NMake Makefiles" -DARCH=x64 -DTOOLCHAIN=VS2019 -DTARGET=Release -DCRYPTO=openssl ..
Note ia32 build is not supported for CLANG build on Windows.
CMake can also generate Visual Studio project files. For example:
cmake -G"Visual Studio 16 2019" -DARCH=x64 -DTOOLCHAIN=VS2019 -DTARGET=Release -DCRYPTO=mbedtls ..
Support OpenSSL binary build. For example:
Note: Install the OpenSSL with command `nmake install` before build libspdm.
cmake -G"Visual Studio 16 2019" -DARCH=x64 -DTOOLCHAIN=VS2019 -DTARGET=Release -DCRYPTO=openssl -DENABLE_BINARY_BUILD=1 -DCOMPILED_LIBCRYPTO_PATH=<OPENSSL_PATH>/libcrypto.lib -DCOMPILED_LIBSSL_PATH=<OPENSSL_PATH>/libssl.lib ..
For other architectures, refer to build.
If ia32 builds run on a 64-bit Linux machine, then install sudo apt-get install gcc-multilib
.
General build steps: (Note the ..
at the end of the cmake command).
cd libspdm
mkdir build
cd build
cmake -DARCH=<x64|ia32|arm|aarch64|riscv32|riscv64|arc> -DTOOLCHAIN=<GCC|CLANG> -DTARGET=<Debug|Release> -DCRYPTO=<mbedtls|openssl> ..
make copy_sample_key
make
Example CMake commands:
cmake -DARCH=ia32 -DTOOLCHAIN=GCC -DTARGET=Debug -DCRYPTO=openssl ..
cmake -DARCH=ia32 -DTOOLCHAIN=GCC -DTARGET=Release -DCRYPTO=openssl ..
cmake -DARCH=arm -DTOOLCHAIN=GCC -DTARGET=Debug -DCRYPTO=openssl ..
cmake -DARCH=x64 -DTOOLCHAIN=CLANG -DTARGET=Release -DCRYPTO=mbedtls ..
Support OpenSSL binary build. For example:
Note: Install OpenSSL with command `sudo make install` before build libspdm.
cmake -DARCH=x64 -DTOOLCHAIN=GCC -DTARGET=Release -DCRYPTO=openssl -DENABLE_BINARY_BUILD=1 -DCOMPILED_LIBCRYPTO_PATH=<OPENSSL_PATH>/libcrypto.a -DCOMPILED_LIBSSL_PATH=<OPENSSL_PATH>/libssl.a ..
For other architectures, refer to build.
Run unit_test
The unit test output is at libspdm/build/bin
.
Open one command prompt at output dir to run test_spdm_requester > NUL
and test_spdm_responder > NUL
.
You should see something like:
[==========] Running 2 test(s). [ RUN ] test_spdm_responder_version_case1 [ OK ] test_spdm_responder_version_case1 [ RUN ] test_spdm_responder_version_case2 [ OK ] test_spdm_responder_version_case2 [==========] 2 test(s) run. [ PASSED ] 2 test(s).
Note: You must use a command prompt with the current working directory at libspdm/build/bin
when running unit tests or they may fail.
Eg. Don't run the unit tests from libsdpm/build directory by calling "bin/test_spdm_responder > NULL"
libspdm also supports other tests such as code coverage, fuzzing, symbolic execution, and model checker.
Refer to test for more details.
spdm-emu implements a full SPDM Requester and a full SPDM Responder using libspdm. It can be used to test a Requester or Responder implementation, or to see how libspdm can be integrated into a Requester or Responder implementation.
spdm-dump tool
spdm-dump can be used to parse pcap
files that capture SPDM traffic for offline analysis.
- Refer to issues for more details.