]> git.proxmox.com Git - mirror_edk2.git/blobdiff - SecurityPkg/SecurityPkg.dec
SecurityPkg: Use IsZeroGuid API for zero GUID checking
[mirror_edk2.git] / SecurityPkg / SecurityPkg.dec
index b5f4eb75f2d147acc951fe5de5366140ee830e45..f4f4d19d15b2428a343693c0542018685f7281e1 100644 (file)
   #\r
   Tcg2PhysicalPresenceLib|Include/Library/Tcg2PhysicalPresenceLib.h\r
 \r
+  ## @libraryclass  Provides interfaces about TCG storage generic commond.\r
+  #\r
+  TcgStorageCoreLib|Include/Library/TcgStorageCoreLib.h\r
+\r
+  ## @libraryclass  Provides interfaces about TCG storage Opal generic commond.\r
+  #\r
+  TcgStorageOpalLib|Include/Library/TcgStorageOpalLib.h\r
+\r
+  ## @libraryclass  Provides interfaces about Opal commond special for Opal password solution.\r
+  #\r
+  OpalPasswordSupportLib|Include/Library/OpalPasswordSupportLib.h\r
+\r
 [Guids]\r
   ## Security package token space guid.\r
   # Include/Guid/SecurityPkgTokenSpace.h\r
   #  Include/Guid/AuthenticatedVariableFormat.h\r
   gEfiVendorKeysNvGuid               = { 0x9073e4e0, 0x60ec, 0x4b6e, { 0x99, 0x3, 0x4c, 0x22, 0x3c, 0x26, 0xf, 0x3c } }\r
 \r
-  ## GUID used to "certdb" variable to store the signer's certificates for common variables with EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS attribute.\r
+  ## GUID used to "certdb"/"certdbv" variable to store the signer's certificates for common variables with EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS attribute.\r
   #  Include/Guid/AuthenticatedVariableFormat.h\r
   gEfiCertDbGuid                     = { 0xd9bee56e, 0x75dc, 0x49d9, { 0xb4, 0xd7, 0xb5, 0x34, 0x21, 0xf, 0x63, 0x7a } }\r
 \r
-  ## GUID used to "SecureBootMode" variable to save platform secure boot mode\r
-  #  Include/Guid/AuthenticatedVariableFormat.h\r
-  gEdkiiSecureBootModeGuid           = { 0xc573b77, 0xeb93, 0x4d3d, { 0xaf, 0xfc, 0x5f, 0xeb, 0xca, 0xfb, 0x65, 0xb0 } }\r
-\r
   ## Hob GUID used to pass a TCG_PCR_EVENT from a TPM PEIM to a TPM DXE Driver.\r
   #  Include/Guid/TcgEventHob.h\r
   gTcgEventEntryHobGuid              = { 0x2b9ffb52, 0x1b13, 0x416f, { 0xa8, 0x7b, 0xbc, 0x93, 0xd, 0xef, 0x92, 0xa8 }}\r
   #  Include/Guid/TrEEConfigHii.h\r
   gTrEEConfigFormSetGuid              = {0xc54b425f, 0xaa79, 0x48b4, { 0x98, 0x1f, 0x99, 0x8b, 0x3c, 0x4b, 0x64, 0x1c }}\r
 \r
+  ## Include/OpalPasswordExtraInfoVariable.h\r
+  gOpalExtraInfoVariableGuid =  {0x44a2ad5d, 0x612c, 0x47b3, {0xb0, 0x6e, 0xc8, 0xf5, 0x0b, 0xfb, 0xf0, 0x7d}}\r
+\r
+\r
 [Ppis]\r
   ## The PPI GUID for that TPM physical presence should be locked.\r
   # Include/Ppi/LockPhysicalPresence.h\r
   # @ValidList  0x80000003 | 0x010D0000\r
   gEfiSecurityPkgTokenSpaceGuid.PcdStatusCodeSubClassTpmDevice|0x010D0000|UINT32|0x00000007\r
 \r
+  ## Null-terminated string of the Version of Physical Presence interface supported by platform.\r
+  # @Prompt Version of Physical Presence interface supported by platform.\r
+  gEfiSecurityPkgTokenSpaceGuid.PcdTcgPhysicalPresenceInterfaceVer|"1.3"|VOID*|0x00000008\r
+\r
 [PcdsFixedAtBuild, PcdsPatchableInModule, PcdsDynamic, PcdsDynamicEx]\r
   ## Indicates the presence or absence of the platform operator during firmware booting.\r
   #  If platform operator is not physical presence during boot. TPM will be locked and the TPM commands \r
   # @Prompt Length(in bytes) of the TCG2 Final event log area.\r
   gEfiSecurityPkgTokenSpaceGuid.PcdTcg2FinalLogAreaLen|0x8000|UINT32|0x00010018\r
 \r
+  ## Indicate whether a physical presence user exist.\r
+  # When it is configured to Dynamic or DynamicEx, it can be set through detection using \r
+  # a platform-specific method (e.g. Button pressed) in a actual platform in early boot phase.<BR><BR>\r
+  # @Prompt A physical presence user status\r
+  gEfiSecurityPkgTokenSpaceGuid.PcdUserPhysicalPresence|FALSE|BOOLEAN|0x00010019\r
+\r
 [PcdsDynamic, PcdsDynamicEx]\r
 \r
   ## This PCD indicates Hash mask for TPM 2.0.<BR><BR>\r