# It also provides the definitions(including PPIs/PROTOCOLs/GUIDs and library classes)\r
# and libraries instances, which are used for those features.\r
#\r
-# Copyright (c) 2009 - 2015, Intel Corporation. All rights reserved.<BR>\r
+# Copyright (c) 2009 - 2016, Intel Corporation. All rights reserved.<BR>\r
# (C) Copyright 2015 Hewlett Packard Enterprise Development LP <BR>\r
# This program and the accompanying materials are licensed and made available under\r
# the terms and conditions of the BSD License which accompanies this distribution.\r
#\r
Tcg2PhysicalPresenceLib|Include/Library/Tcg2PhysicalPresenceLib.h\r
\r
+ ## @libraryclass Provides interfaces about TCG storage generic commond.\r
+ #\r
+ TcgStorageCoreLib|Include/Library/TcgStorageCoreLib.h\r
+\r
+ ## @libraryclass Provides interfaces about TCG storage Opal generic commond.\r
+ #\r
+ TcgStorageOpalLib|Include/Library/TcgStorageOpalLib.h\r
+\r
+ ## @libraryclass Provides interfaces about Opal commond special for Opal password solution.\r
+ #\r
+ OpalPasswordSupportLib|Include/Library/OpalPasswordSupportLib.h\r
+\r
[Guids]\r
## Security package token space guid.\r
# Include/Guid/SecurityPkgTokenSpace.h\r
# Include/Guid/AuthenticatedVariableFormat.h\r
gEfiVendorKeysNvGuid = { 0x9073e4e0, 0x60ec, 0x4b6e, { 0x99, 0x3, 0x4c, 0x22, 0x3c, 0x26, 0xf, 0x3c } }\r
\r
- ## GUID used to "certdb" variable to store the signer's certificates for common variables with EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS attribute.\r
+ ## GUID used to "certdb"/"certdbv" variable to store the signer's certificates for common variables with EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS attribute.\r
# Include/Guid/AuthenticatedVariableFormat.h\r
gEfiCertDbGuid = { 0xd9bee56e, 0x75dc, 0x49d9, { 0xb4, 0xd7, 0xb5, 0x34, 0x21, 0xf, 0x63, 0x7a } }\r
- \r
+\r
## Hob GUID used to pass a TCG_PCR_EVENT from a TPM PEIM to a TPM DXE Driver.\r
# Include/Guid/TcgEventHob.h\r
gTcgEventEntryHobGuid = { 0x2b9ffb52, 0x1b13, 0x416f, { 0xa8, 0x7b, 0xbc, 0x93, 0xd, 0xef, 0x92, 0xa8 }}\r
# Include/Guid/TrEEConfigHii.h\r
gTrEEConfigFormSetGuid = {0xc54b425f, 0xaa79, 0x48b4, { 0x98, 0x1f, 0x99, 0x8b, 0x3c, 0x4b, 0x64, 0x1c }}\r
\r
+ ## Include/OpalPasswordExtraInfoVariable.h\r
+ gOpalExtraInfoVariableGuid = {0x44a2ad5d, 0x612c, 0x47b3, {0xb0, 0x6e, 0xc8, 0xf5, 0x0b, 0xfb, 0xf0, 0x7d}}\r
+\r
+\r
[Ppis]\r
## The PPI GUID for that TPM physical presence should be locked.\r
# Include/Ppi/LockPhysicalPresence.h\r
# @ValidList 0x80000003 | 0x010D0000\r
gEfiSecurityPkgTokenSpaceGuid.PcdStatusCodeSubClassTpmDevice|0x010D0000|UINT32|0x00000007\r
\r
+ ## Null-terminated string of the Version of Physical Presence interface supported by platform.\r
+ # @Prompt Version of Physical Presence interface supported by platform.\r
+ gEfiSecurityPkgTokenSpaceGuid.PcdTcgPhysicalPresenceInterfaceVer|"1.3"|VOID*|0x00000008\r
+\r
[PcdsFixedAtBuild, PcdsPatchableInModule, PcdsDynamic, PcdsDynamicEx]\r
## Indicates the presence or absence of the platform operator during firmware booting.\r
# If platform operator is not physical presence during boot. TPM will be locked and the TPM commands \r
#\r
gEfiSecurityPkgTokenSpaceGuid.PcdRsa2048Sha256PublicKeyBuffer|{0x91, 0x29, 0xc4, 0xbd, 0xea, 0x6d, 0xda, 0xb3, 0xaa, 0x6f, 0x50, 0x16, 0xfc, 0xdb, 0x4b, 0x7e, 0x3c, 0xd6, 0xdc, 0xa4, 0x7a, 0x0e, 0xdd, 0xe6, 0x15, 0x8c, 0x73, 0x96, 0xa2, 0xd4, 0xa6, 0x4d}|VOID*|0x00010013\r
\r
+ ## This PCD defines minimum length(in bytes) of the system preboot TCG event log area(LAML).\r
+ # For PC Client Implementation spec up to and including 1.2 the minimum log size is 64KB.\r
+ # @Prompt Minimum length(in bytes) of the system preboot TCG event log area(LAML).\r
+ gEfiSecurityPkgTokenSpaceGuid.PcdTcgLogAreaMinLen|0x10000|UINT32|0x00010017\r
+\r
+ ## This PCD defines length(in bytes) of the TCG2 Final event log area.\r
+ # @Prompt Length(in bytes) of the TCG2 Final event log area.\r
+ gEfiSecurityPkgTokenSpaceGuid.PcdTcg2FinalLogAreaLen|0x8000|UINT32|0x00010018\r
+\r
+ ## Indicate whether a physical presence user exist.\r
+ # When it is configured to Dynamic or DynamicEx, it can be set through detection using \r
+ # a platform-specific method (e.g. Button pressed) in a actual platform in early boot phase.<BR><BR>\r
+ # @Prompt A physical presence user status\r
+ gEfiSecurityPkgTokenSpaceGuid.PcdUserPhysicalPresence|FALSE|BOOLEAN|0x00010019\r
+\r
[PcdsDynamic, PcdsDynamicEx]\r
\r
## This PCD indicates Hash mask for TPM 2.0.<BR><BR>\r