X-Git-Url: https://git.proxmox.com/?p=mirror_edk2.git;a=blobdiff_plain;f=SecurityPkg%2FSecurityPkg.dec;h=77d6b073d4010472fae9b19ecd63fcc6d9009ebb;hp=df4082bb8d257c69a5c0aeba876397eda9526d17;hb=1101ffbf84158fc5094987d42fc404bd00fb16b4;hpb=d7c054f98591389f8e4dd46d2172949dbec2777c diff --git a/SecurityPkg/SecurityPkg.dec b/SecurityPkg/SecurityPkg.dec index df4082bb8d..77d6b073d4 100644 --- a/SecurityPkg/SecurityPkg.dec +++ b/SecurityPkg/SecurityPkg.dec @@ -5,7 +5,7 @@ # It also provides the definitions(including PPIs/PROTOCOLs/GUIDs and library classes) # and libraries instances, which are used for those features. # -# Copyright (c) 2009 - 2017, Intel Corporation. All rights reserved.
+# Copyright (c) 2009 - 2018, Intel Corporation. All rights reserved.
# (C) Copyright 2015 Hewlett Packard Enterprise Development LP
# Copyright (c) 2017, Microsoft Corporation. All rights reserved.
# This program and the accompanying materials are licensed and made available under @@ -23,7 +23,7 @@ PACKAGE_NAME = SecurityPkg PACKAGE_UNI_FILE = SecurityPkg.uni PACKAGE_GUID = 4EFC4F66-6219-4427-B780-FB99F470767F - PACKAGE_VERSION = 0.97 + PACKAGE_VERSION = 0.98 [Includes] Include @@ -90,10 +90,6 @@ # TcgStorageOpalLib|Include/Library/TcgStorageOpalLib.h - ## @libraryclass Provides interfaces about Opal commond special for Opal password solution. - # - OpalPasswordSupportLib|Include/Library/OpalPasswordSupportLib.h - [Guids] ## Security package token space guid. # Include/Guid/SecurityPkgTokenSpace.h @@ -234,18 +230,6 @@ # [PcdsFixedAtBuild, PcdsPatchableInModule] - ## Image verification policy for OptionRom. Only following values are valid:

- # NOTE: Do NOT use 0x5 and 0x2 since it violates the UEFI specification and has been removed.
- # 0x00000000 Always trust the image.
- # 0x00000001 Never trust the image.
- # 0x00000002 Allow execution when there is security violation.
- # 0x00000003 Defer execution when there is security violation.
- # 0x00000004 Deny execution when there is security violation.
- # 0x00000005 Query user when there is security violation.
- # @Prompt Set policy for the image from OptionRom. - # @ValidRange 0x80000001 | 0x00000000 - 0x00000005 - gEfiSecurityPkgTokenSpaceGuid.PcdOptionRomImageVerificationPolicy|0x04|UINT32|0x00000001 - ## Image verification policy for removable media which includes CD-ROM, Floppy, USB and network. # Only following values are valid:

# NOTE: Do NOT use 0x5 and 0x2 since it violates the UEFI specification and has been removed.
@@ -308,6 +292,18 @@ gEfiSecurityPkgTokenSpaceGuid.PcdStatusCodeSubClassTpmDevice|0x010D0000|UINT32|0x00000007 [PcdsFixedAtBuild, PcdsPatchableInModule, PcdsDynamic, PcdsDynamicEx] + ## Image verification policy for OptionRom. Only following values are valid:

+ # NOTE: Do NOT use 0x5 and 0x2 since it violates the UEFI specification and has been removed.
+ # 0x00000000 Always trust the image.
+ # 0x00000001 Never trust the image.
+ # 0x00000002 Allow execution when there is security violation.
+ # 0x00000003 Defer execution when there is security violation.
+ # 0x00000004 Deny execution when there is security violation.
+ # 0x00000005 Query user when there is security violation.
+ # @Prompt Set policy for the image from OptionRom. + # @ValidRange 0x80000001 | 0x00000000 - 0x00000005 + gEfiSecurityPkgTokenSpaceGuid.PcdOptionRomImageVerificationPolicy|0x04|UINT32|0x00000001 + ## Indicates the presence or absence of the platform operator during firmware booting. # If platform operator is not physical presence during boot. TPM will be locked and the TPM commands # that required operator physical presence can not run.

@@ -450,6 +446,16 @@ # @Prompt Initial setting of TCG2 Persistent Firmware Management Flags gEfiSecurityPkgTokenSpaceGuid.PcdTcg2PhysicalPresenceFlags|0x300E2|UINT32|0x0001001B + ## Indicate current TPM2 Interrupt Number reported by _CRS control method.

+ # TPM2 Interrupt feature is disabled If the pcd is set to 0.
+ # @Prompt Current TPM2 Interrupt Number + gEfiSecurityPkgTokenSpaceGuid.PcdTpm2CurrentIrqNum|0x00|UINT32|0x0001001C + + ## Indicate platform possible TPM2 Interrupt Number reported by _PRS control method.

+ # Possible TPM2 Interrupt Number Buffer will not be reported if TPM2 Interrupt feature is disabled.
+ # @Prompt Possible TPM2 Interrupt Number buffer + gEfiSecurityPkgTokenSpaceGuid.PcdTpm2PossibleIrqNumBuf|{0x00, 0x00, 0x00, 0x00}|VOID*|0x0001001D + [PcdsDynamic, PcdsDynamicEx] ## This PCD indicates Hash mask for TPM 2.0. Bit definition strictly follows TCG Algorithm Registry.