# This package includes the security drivers, defintions(including PPIs/PROTOCOLs/GUIDs \r
# and library classes) and libraries instances.\r
#\r
-# Copyright (c) 2009 - 2012, Intel Corporation. All rights reserved.<BR>\r
+# Copyright (c) 2009 - 2013, Intel Corporation. All rights reserved.<BR>\r
# This program and the accompanying materials are licensed and made available under\r
# the terms and conditions of the BSD License which accompanies this distribution.\r
# The full text of the license may be found at\r
# Include/Guid/AuthenticatedVariableFormat.h\r
gEfiCustomModeEnableGuid = { 0xc076ec0c, 0x7028, 0x4399, { 0xa0, 0x72, 0x71, 0xee, 0x5c, 0x44, 0x8b, 0x9f } }\r
\r
+ # Include/Guid/AuthenticatedVariableFormat.h\r
+ gEfiVendorKeysNvGuid = { 0x9073e4e0, 0x60ec, 0x4b6e, { 0x99, 0x3, 0x4c, 0x22, 0x3c, 0x26, 0xf, 0x3c } }\r
+\r
# Include/Guid/AuthenticatedVariableFormat.h\r
gEfiCertDbGuid = { 0xd9bee56e, 0x75dc, 0x49d9, { 0xb4, 0xd7, 0xb5, 0x34, 0x21, 0xf, 0x63, 0x7a } }\r
\r
## Include/Guid/TcgEventHob.h\r
- gTcgEventEntryHobGuid = { 0x2e3044ac, 0x879f, 0x490f, {0x97, 0x60, 0xbb, 0xdf, 0xaf, 0x69, 0x5f, 0x50 }}\r
+ gTcgEventEntryHobGuid = { 0x2b9ffb52, 0x1b13, 0x416f, { 0xa8, 0x7b, 0xbc, 0x93, 0xd, 0xef, 0x92, 0xa8 }}\r
+\r
+ ## Include/Guid/MeasuredFvHob.h\r
+ gMeasuredFvHobGuid = { 0xb2360b42, 0x7173, 0x420a, { 0x86, 0x96, 0x46, 0xca, 0x6b, 0xab, 0x10, 0x60 }}\r
\r
## Include/Guid/PhysicalPresenceData.h\r
gEfiPhysicalPresenceGuid = { 0xf6499b1, 0xe9ad, 0x493d, { 0xb9, 0xc2, 0x2f, 0x90, 0x81, 0x5c, 0x6c, 0xbc }}\r
# DEFER_EXECUTE_ON_SECURITY_VIOLATION 0x00000003\r
# DENY_EXECUTE_ON_SECURITY_VIOLATION 0x00000004\r
# QUERY_USER_ON_SECURITY_VIOLATION 0x00000005 \r
- gEfiSecurityPkgTokenSpaceGuid.PcdOptionRomImageVerificationPolicy|0x00|UINT32|0x00000001\r
+ # NOTE: Do NOT use QUERY_USER_ON_SECURITY_VIOLATION since it violates the UEFI specification and has been removed.\r
+ gEfiSecurityPkgTokenSpaceGuid.PcdOptionRomImageVerificationPolicy|0x04|UINT32|0x00000001\r
\r
## Pcd for removable media.\r
# Removable media include CD-ROM, Floppy, USB and network.\r
# DEFER_EXECUTE_ON_SECURITY_VIOLATION 0x00000003\r
# DENY_EXECUTE_ON_SECURITY_VIOLATION 0x00000004\r
# QUERY_USER_ON_SECURITY_VIOLATION 0x00000005\r
- gEfiSecurityPkgTokenSpaceGuid.PcdRemovableMediaImageVerificationPolicy|0x05|UINT32|0x00000002\r
+ # NOTE: Do NOT use QUERY_USER_ON_SECURITY_VIOLATION since it violates the UEFI specification and has been removed.\r
+ gEfiSecurityPkgTokenSpaceGuid.PcdRemovableMediaImageVerificationPolicy|0x04|UINT32|0x00000002\r
\r
## Pcd for fixed media.\r
# Fixed media include hard disk.\r
# DEFER_EXECUTE_ON_SECURITY_VIOLATION 0x00000003\r
# DENY_EXECUTE_ON_SECURITY_VIOLATION 0x00000004\r
# QUERY_USER_ON_SECURITY_VIOLATION 0x00000005 \r
- gEfiSecurityPkgTokenSpaceGuid.PcdFixedMediaImageVerificationPolicy|0x05|UINT32|0x00000003\r
+ # NOTE: Do NOT use QUERY_USER_ON_SECURITY_VIOLATION since it violates the UEFI specification and has been removed.\r
+ gEfiSecurityPkgTokenSpaceGuid.PcdFixedMediaImageVerificationPolicy|0x04|UINT32|0x00000003\r
\r
## Defer Image Load policy settings.\r
# The policy is bitwise. \r