public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: chenc2 <chen.a.chen@intel.com>
To: edk2-devel@lists.01.org
Cc: chenc2 <chen.a.chen@intel.com>,
	Chao Zhang <chao.b.zhang@intel.com>,
	Jiewen Yao <jiewen.yao@intel.com>,
	Michael D Kinney <michael.d.kinney@intel.com>
Subject: [PATCH 30/37] SecurityPkg: Removing ipf which is no longer supported from edk2.
Date: Wed, 13 Jun 2018 11:45:44 +0800	[thread overview]
Message-ID: <20180613034544.3228-1-chen.a.chen@intel.com> (raw)

Removing rules for Ipf sources file:
* Remove the source file which path with "ipf" and also listed in
  [Sources.IPF] section of INF file.
* Remove the source file which listed in [Components.IPF] section
  of DSC file and not listed in any other [Components] section.
* Remove the embedded Ipf code for MDE_CPU_IPF.

Removing rules for Inf file:
* Remove IPF from VALID_ARCHITECTURES comments.
* Remove DXE_SAL_DRIVER from LIBRARY_CLASS in [Defines] section.
* Remove the INF which only listed in [Components.IPF] section in DSC.
* Remove statements from [BuildOptions] that provide IPF specific flags.
* Remove any IPF sepcific sections.

Removing rules for Dec file:
* Remove [Includes.IPF] section from Dec.

Removing rules for Dsc file:
* Remove IPF from SUPPORTED_ARCHITECTURES in [Defines] section of DSC.
* Remove any IPF specific sections.
* Remove statements from [BuildOptions] that provide IPF specific flags.

Cc: Chao Zhang <chao.b.zhang@intel.com>
Cc: Jiewen Yao <jiewen.yao@intel.com>
Cc: Michael D Kinney <michael.d.kinney@intel.com>
Signed-off-by: chenc2 <chen.a.chen@intel.com>
Contributed-under: TianoCore Contribution Agreement 1.1
---
 SecurityPkg/Hash2DxeCrypto/Hash2DxeCrypto.inf      |    4 +-
 .../DxeImageAuthenticationStatusLib.inf            |    4 +-
 .../DxeImageVerificationLib.inf                    |    4 +-
 .../DxeRsa2048Sha256GuidedSectionExtractLib.inf    |    6 +-
 .../DxeTcg2PhysicalPresenceLib.inf                 |    4 +-
 .../DxeTcgPhysicalPresenceLib.inf                  |    4 +-
 .../DxeTpm2MeasureBootLib.inf                      |    4 +-
 .../DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.inf  |    4 +-
 .../DxeTpmMeasurementLib/DxeTpmMeasurementLib.inf  |    4 +-
 .../FmpAuthenticationLibPkcs7.inf                  |    2 +-
 .../FmpAuthenticationLibRsa2048Sha256.inf          |    2 +-
 .../HashInstanceLibSha1/HashInstanceLibSha1.inf    |    2 +-
 .../HashInstanceLibSha256.inf                      |    2 +-
 .../HashLibBaseCryptoRouterDxe.inf                 |    4 +-
 .../HashLibBaseCryptoRouterPei.inf                 |    2 +-
 SecurityPkg/Library/HashLibTpm2/HashLibTpm2.inf    |    2 +-
 .../PeiRsa2048Sha256GuidedSectionExtractLib.inf    |    4 +-
 .../PeiTcg2PhysicalPresenceLib.inf                 |    4 +-
 .../PlatformSecureLibNull.inf                      |    2 +-
 .../SmmTcg2PhysicalPresenceLib.inf                 |    4 +-
 .../Tcg2PpVendorLibNull/Tcg2PpVendorLibNull.inf    |    4 +-
 .../TcgPpVendorLibNull/TcgPpVendorLibNull.inf      |    4 +-
 .../Library/Tpm12CommandLib/Tpm12CommandLib.inf    |    2 +-
 .../Tpm12DeviceLibDTpm/Tpm12DeviceLibDTpm.inf      |    4 +-
 .../Tpm12DeviceLibTcg/Tpm12DeviceLibTcg.inf        |    4 +-
 .../Library/Tpm2CommandLib/Tpm2CommandLib.inf      |    2 +-
 .../Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpm.inf        |    2 +-
 .../Tpm2DeviceLibDTpm/Tpm2InstanceLibDTpm.inf      |    2 +-
 .../Tpm2DeviceLibRouter/Tpm2DeviceLibRouterDxe.inf |    4 +-
 .../Tpm2DeviceLibRouter/Tpm2DeviceLibRouterPei.inf |    4 +-
 .../Tpm2DeviceLibTcg2/Tpm2DeviceLibTcg2.inf        |    4 +-
 SecurityPkg/Library/TpmCommLib/TpmCommLib.inf      |    2 +-
 SecurityPkg/SecurityPkg.dsc                        |   16 +-
 SecurityPkg/Tcg/MemoryOverwriteControl/TcgMor.inf  |    2 +-
 .../TcgMorLockSmm.inf                              |    2 +-
 .../Tcg/Opal/OpalPassword/OpalPasswordDxe.inf      |    2 +-
 .../PhysicalPresencePei/PhysicalPresencePei.inf    |    4 +-
 SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf       |    2 +-
 SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf       |    2 +-
 SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf                |    2 +-
 SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf                |    2 +-
 SecurityPkg/Tcg/TcgConfigDxe/TcgConfigDxe.inf      |    2 +-
 SecurityPkg/Tcg/TcgDxe/TcgDxe.inf                  |    4 +-
 SecurityPkg/Tcg/TcgPei/TcgPei.inf                  |    4 +-
 .../EsalVariableDxeSal/AuthService.c               |  886 ------
 .../EsalVariableDxeSal/AuthService.h               |  151 -
 .../EsalVariableDxeSal/EsalVariableDxeSal.inf      |  105 -
 .../EsalVariableDxeSal/InitVariable.c              |  247 --
 .../EsalVariableDxeSal/Reclaim.c                   |  262 --
 .../EsalVariableDxeSal/Variable.c                  | 3257 --------------------
 .../EsalVariableDxeSal/Variable.h                  |  505 ---
 .../SecureBootConfigDxe/SecureBootConfigDxe.inf    |    2 +-
 52 files changed, 71 insertions(+), 5494 deletions(-)
 delete mode 100644 SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/AuthService.c
 delete mode 100644 SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/AuthService.h
 delete mode 100644 SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/EsalVariableDxeSal.inf
 delete mode 100644 SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/InitVariable.c
 delete mode 100644 SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/Reclaim.c
 delete mode 100644 SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/Variable.c
 delete mode 100644 SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/Variable.h

diff --git a/SecurityPkg/Hash2DxeCrypto/Hash2DxeCrypto.inf b/SecurityPkg/Hash2DxeCrypto/Hash2DxeCrypto.inf
index 557dedbbea..1fb568c071 100644
--- a/SecurityPkg/Hash2DxeCrypto/Hash2DxeCrypto.inf
+++ b/SecurityPkg/Hash2DxeCrypto/Hash2DxeCrypto.inf
@@ -27,7 +27,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources.common]
@@ -61,4 +61,4 @@
   gEfiHash2ServiceBindingProtocolGuid   ## PRODUCES
 
 [UserExtensions.TianoCore."ExtraFiles"]
-  Hash2DxeCryptoExtra.uni
\ No newline at end of file
+  Hash2DxeCryptoExtra.uni
diff --git a/SecurityPkg/Library/DxeImageAuthenticationStatusLib/DxeImageAuthenticationStatusLib.inf b/SecurityPkg/Library/DxeImageAuthenticationStatusLib/DxeImageAuthenticationStatusLib.inf
index 62fcdaacc6..ba94aae885 100644
--- a/SecurityPkg/Library/DxeImageAuthenticationStatusLib/DxeImageAuthenticationStatusLib.inf
+++ b/SecurityPkg/Library/DxeImageAuthenticationStatusLib/DxeImageAuthenticationStatusLib.inf
@@ -20,13 +20,13 @@
   FILE_GUID                      = EB92D1DE-7C36-4680-BB88-A67E96049F72
   MODULE_TYPE                    = DXE_DRIVER
   VERSION_STRING                 = 1.0
-  LIBRARY_CLASS                  = NULL|DXE_DRIVER DXE_RUNTIME_DRIVER DXE_SAL_DRIVER DXE_SMM_DRIVER UEFI_APPLICATION UEFI_DRIVER 
+  LIBRARY_CLASS                  = NULL|DXE_DRIVER DXE_RUNTIME_DRIVER DXE_SMM_DRIVER UEFI_APPLICATION UEFI_DRIVER
   CONSTRUCTOR                    = DxeImageAuthenticationStatusLibConstructor
 
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.inf b/SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.inf
index 3430b6ea9d..e50c0b9979 100644
--- a/SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.inf
+++ b/SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.inf
@@ -25,13 +25,13 @@
   FILE_GUID                      = 0CA970E1-43FA-4402-BC0A-81AF336BFFD6
   MODULE_TYPE                    = DXE_DRIVER
   VERSION_STRING                 = 1.0
-  LIBRARY_CLASS                  = NULL|DXE_DRIVER DXE_RUNTIME_DRIVER DXE_SAL_DRIVER DXE_SMM_DRIVER UEFI_APPLICATION UEFI_DRIVER
+  LIBRARY_CLASS                  = NULL|DXE_DRIVER DXE_RUNTIME_DRIVER DXE_SMM_DRIVER UEFI_APPLICATION UEFI_DRIVER
   CONSTRUCTOR                    = DxeImageVerificationLibConstructor
 
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/DxeRsa2048Sha256GuidedSectionExtractLib/DxeRsa2048Sha256GuidedSectionExtractLib.inf b/SecurityPkg/Library/DxeRsa2048Sha256GuidedSectionExtractLib/DxeRsa2048Sha256GuidedSectionExtractLib.inf
index 4681f08643..023004ff40 100644
--- a/SecurityPkg/Library/DxeRsa2048Sha256GuidedSectionExtractLib/DxeRsa2048Sha256GuidedSectionExtractLib.inf
+++ b/SecurityPkg/Library/DxeRsa2048Sha256GuidedSectionExtractLib/DxeRsa2048Sha256GuidedSectionExtractLib.inf
@@ -22,14 +22,14 @@
   FILE_GUID                      = 0AD6C423-4732-4cf3-9CE3-0A5416D634A5
   MODULE_TYPE                    = DXE_DRIVER
   VERSION_STRING                 = 1.0
-  LIBRARY_CLASS                  = NULL|DXE_CORE DXE_DRIVER DXE_RUNTIME_DRIVER DXE_SAL_DRIVER DXE_SMM_DRIVER UEFI_APPLICATION UEFI_DRIVER
+  LIBRARY_CLASS                  = NULL|DXE_CORE DXE_DRIVER DXE_RUNTIME_DRIVER DXE_SMM_DRIVER UEFI_APPLICATION UEFI_DRIVER
   CONSTRUCTOR                    = DxeRsa2048Sha256GuidedSectionExtractLibConstructor
   MODULE_UNI_FILE                = DxeRsa2048Sha256GuidedSectionExtractLib.uni
 
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources]
@@ -59,4 +59,4 @@
 [Guids]
   gEfiCertTypeRsa2048Sha256Guid  ## PRODUCES       ## UNDEFINED  # Specifies RSA 2048 SHA 256 authentication algorithm.
   gEfiHashAlgorithmSha256Guid    ## SOMETIMES_CONSUMES ## UNDEFINED
-  
\ No newline at end of file
+
diff --git a/SecurityPkg/Library/DxeTcg2PhysicalPresenceLib/DxeTcg2PhysicalPresenceLib.inf b/SecurityPkg/Library/DxeTcg2PhysicalPresenceLib/DxeTcg2PhysicalPresenceLib.inf
index fc10129989..52edd5c645 100644
--- a/SecurityPkg/Library/DxeTcg2PhysicalPresenceLib/DxeTcg2PhysicalPresenceLib.inf
+++ b/SecurityPkg/Library/DxeTcg2PhysicalPresenceLib/DxeTcg2PhysicalPresenceLib.inf
@@ -25,12 +25,12 @@
   FILE_GUID                      = 7E507A86-DE8B-4AD3-BC4C-0498389098D3
   MODULE_TYPE                    = DXE_DRIVER
   VERSION_STRING                 = 1.0
-  LIBRARY_CLASS                  = Tcg2PhysicalPresenceLib|DXE_DRIVER DXE_RUNTIME_DRIVER DXE_SAL_DRIVER UEFI_APPLICATION UEFI_DRIVER 
+  LIBRARY_CLASS                  = Tcg2PhysicalPresenceLib|DXE_DRIVER DXE_RUNTIME_DRIVER UEFI_APPLICATION UEFI_DRIVER
 
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceLib.inf b/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceLib.inf
index 3aacba5c2b..98c873bbc5 100644
--- a/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceLib.inf
+++ b/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceLib.inf
@@ -26,13 +26,13 @@
   FILE_GUID                      = EBC43A46-34AC-4F07-A7F5-A5394619361C
   MODULE_TYPE                    = DXE_DRIVER
   VERSION_STRING                 = 1.0
-  LIBRARY_CLASS                  = TcgPhysicalPresenceLib|DXE_DRIVER DXE_RUNTIME_DRIVER DXE_SAL_DRIVER UEFI_APPLICATION UEFI_DRIVER 
+  LIBRARY_CLASS                  = TcgPhysicalPresenceLib|DXE_DRIVER DXE_RUNTIME_DRIVER UEFI_APPLICATION UEFI_DRIVER
   CONSTRUCTOR                    = TcgPhysicalPresenceLibConstructor
   
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf
index 939f6fb19b..7758bf8f29 100644
--- a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf
+++ b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf
@@ -29,13 +29,13 @@
   FILE_GUID                      = 778CE4F4-36BD-4ae7-B8F0-10B420B0D174
   MODULE_TYPE                    = DXE_DRIVER
   VERSION_STRING                 = 1.0
-  LIBRARY_CLASS                  = NULL|DXE_DRIVER DXE_RUNTIME_DRIVER DXE_SAL_DRIVER DXE_SMM_DRIVER UEFI_APPLICATION UEFI_DRIVER 
+  LIBRARY_CLASS                  = NULL|DXE_DRIVER DXE_RUNTIME_DRIVER DXE_SMM_DRIVER UEFI_APPLICATION UEFI_DRIVER
   CONSTRUCTOR                    = DxeTpm2MeasureBootLibConstructor
 
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.inf b/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.inf
index 553e68321e..2547b44e6d 100644
--- a/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.inf
+++ b/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.inf
@@ -26,13 +26,13 @@
   FILE_GUID                      = 6C60C7D0-922A-4b7c-87D7-E503EDD73BBF
   MODULE_TYPE                    = DXE_DRIVER
   VERSION_STRING                 = 1.0
-  LIBRARY_CLASS                  = NULL|DXE_DRIVER DXE_RUNTIME_DRIVER DXE_SAL_DRIVER DXE_SMM_DRIVER UEFI_APPLICATION UEFI_DRIVER 
+  LIBRARY_CLASS                  = NULL|DXE_DRIVER DXE_RUNTIME_DRIVER DXE_SMM_DRIVER UEFI_APPLICATION UEFI_DRIVER
   CONSTRUCTOR                    = DxeTpmMeasureBootLibConstructor
 
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.inf b/SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.inf
index 410eb788db..72630ef785 100644
--- a/SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.inf
+++ b/SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.inf
@@ -20,13 +20,13 @@
   FILE_GUID                      = 30930D10-AF5B-4abf-80E6-EB4FFC0AE9D1
   MODULE_TYPE                    = UEFI_DRIVER
   VERSION_STRING                 = 1.0
-  LIBRARY_CLASS                  = TpmMeasurementLib|DXE_DRIVER DXE_RUNTIME_DRIVER DXE_SAL_DRIVER DXE_SMM_DRIVER UEFI_APPLICATION UEFI_DRIVER 
+  LIBRARY_CLASS                  = TpmMeasurementLib|DXE_DRIVER DXE_RUNTIME_DRIVER DXE_SMM_DRIVER UEFI_APPLICATION UEFI_DRIVER
   MODULE_UNI_FILE                = DxeTpmMeasurementLib.uni
 
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/FmpAuthenticationLibPkcs7/FmpAuthenticationLibPkcs7.inf b/SecurityPkg/Library/FmpAuthenticationLibPkcs7/FmpAuthenticationLibPkcs7.inf
index 215b3cbecd..8c41b8266a 100644
--- a/SecurityPkg/Library/FmpAuthenticationLibPkcs7/FmpAuthenticationLibPkcs7.inf
+++ b/SecurityPkg/Library/FmpAuthenticationLibPkcs7/FmpAuthenticationLibPkcs7.inf
@@ -26,7 +26,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/FmpAuthenticationLibRsa2048Sha256/FmpAuthenticationLibRsa2048Sha256.inf b/SecurityPkg/Library/FmpAuthenticationLibRsa2048Sha256/FmpAuthenticationLibRsa2048Sha256.inf
index cdd22429c2..8633319e56 100644
--- a/SecurityPkg/Library/FmpAuthenticationLibRsa2048Sha256/FmpAuthenticationLibRsa2048Sha256.inf
+++ b/SecurityPkg/Library/FmpAuthenticationLibRsa2048Sha256/FmpAuthenticationLibRsa2048Sha256.inf
@@ -26,7 +26,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/HashInstanceLibSha1/HashInstanceLibSha1.inf b/SecurityPkg/Library/HashInstanceLibSha1/HashInstanceLibSha1.inf
index 588c5f1ac4..5152aab5b5 100644
--- a/SecurityPkg/Library/HashInstanceLibSha1/HashInstanceLibSha1.inf
+++ b/SecurityPkg/Library/HashInstanceLibSha1/HashInstanceLibSha1.inf
@@ -26,7 +26,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/HashInstanceLibSha256/HashInstanceLibSha256.inf b/SecurityPkg/Library/HashInstanceLibSha256/HashInstanceLibSha256.inf
index a4b2ccf9e2..12092adc19 100644
--- a/SecurityPkg/Library/HashInstanceLibSha256/HashInstanceLibSha256.inf
+++ b/SecurityPkg/Library/HashInstanceLibSha256/HashInstanceLibSha256.inf
@@ -26,7 +26,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.inf b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.inf
index 6e660d4f14..de76f4b64e 100644
--- a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.inf
+++ b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.inf
@@ -22,13 +22,13 @@
   FILE_GUID                      = 158DC712-F15A-44dc-93BB-1675045BE066
   MODULE_TYPE                    = DXE_DRIVER
   VERSION_STRING                 = 1.0
-  LIBRARY_CLASS                  = HashLib|DXE_DRIVER DXE_RUNTIME_DRIVER DXE_SAL_DRIVER DXE_SMM_DRIVER UEFI_APPLICATION UEFI_DRIVER 
+  LIBRARY_CLASS                  = HashLib|DXE_DRIVER DXE_RUNTIME_DRIVER DXE_SMM_DRIVER UEFI_APPLICATION UEFI_DRIVER
   CONSTRUCTOR                    = HashLibBaseCryptoRouterDxeConstructor
 
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.inf b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.inf
index 018090b8fa..fb97a1f746 100644
--- a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.inf
+++ b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.inf
@@ -28,7 +28,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/HashLibTpm2/HashLibTpm2.inf b/SecurityPkg/Library/HashLibTpm2/HashLibTpm2.inf
index f807cc7f3d..257ae5c305 100644
--- a/SecurityPkg/Library/HashLibTpm2/HashLibTpm2.inf
+++ b/SecurityPkg/Library/HashLibTpm2/HashLibTpm2.inf
@@ -26,7 +26,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/PeiRsa2048Sha256GuidedSectionExtractLib/PeiRsa2048Sha256GuidedSectionExtractLib.inf b/SecurityPkg/Library/PeiRsa2048Sha256GuidedSectionExtractLib/PeiRsa2048Sha256GuidedSectionExtractLib.inf
index 3b781c71c7..70f2a60828 100644
--- a/SecurityPkg/Library/PeiRsa2048Sha256GuidedSectionExtractLib/PeiRsa2048Sha256GuidedSectionExtractLib.inf
+++ b/SecurityPkg/Library/PeiRsa2048Sha256GuidedSectionExtractLib/PeiRsa2048Sha256GuidedSectionExtractLib.inf
@@ -29,7 +29,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources]
@@ -55,4 +55,4 @@
 [Guids]
   gEfiCertTypeRsa2048Sha256Guid  ## PRODUCES     ## UNDEFINED  # Specifies RSA 2048 SHA 256 authentication algorithm.
   gEfiHashAlgorithmSha256Guid    ## SOMETIMES_CONSUMES ## UNDEFINED
-  
\ No newline at end of file
+
diff --git a/SecurityPkg/Library/PeiTcg2PhysicalPresenceLib/PeiTcg2PhysicalPresenceLib.inf b/SecurityPkg/Library/PeiTcg2PhysicalPresenceLib/PeiTcg2PhysicalPresenceLib.inf
index 6d0b7a00cb..2dd663a3b9 100644
--- a/SecurityPkg/Library/PeiTcg2PhysicalPresenceLib/PeiTcg2PhysicalPresenceLib.inf
+++ b/SecurityPkg/Library/PeiTcg2PhysicalPresenceLib/PeiTcg2PhysicalPresenceLib.inf
@@ -25,7 +25,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 
 [Sources]
@@ -49,4 +49,4 @@
   gEfiPeiReadOnlyVariable2PpiGuid       ## CONSUMES
 
 [Depex]
-  gEfiPeiReadOnlyVariable2PpiGuid
\ No newline at end of file
+  gEfiPeiReadOnlyVariable2PpiGuid
diff --git a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf
index be415f4166..c653426971 100644
--- a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf
+++ b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf
@@ -29,7 +29,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/SmmTcg2PhysicalPresenceLib.inf b/SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/SmmTcg2PhysicalPresenceLib.inf
index 83670971c9..acbc357256 100644
--- a/SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/SmmTcg2PhysicalPresenceLib.inf
+++ b/SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/SmmTcg2PhysicalPresenceLib.inf
@@ -30,7 +30,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 
 [Sources]
@@ -57,4 +57,4 @@
   gEfiSecurityPkgTokenSpaceGuid.PcdTcgPhysicalPresenceInterfaceVer  ## CONSUMES
 
 [Depex]
-  gEfiSmmVariableProtocolGuid
\ No newline at end of file
+  gEfiSmmVariableProtocolGuid
diff --git a/SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibNull.inf b/SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibNull.inf
index f953fe95a7..7a54c6f9cb 100644
--- a/SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibNull.inf
+++ b/SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibNull.inf
@@ -23,7 +23,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 
 [Sources]
@@ -34,4 +34,4 @@
   SecurityPkg/SecurityPkg.dec
   
 [LibraryClasses]
-  DebugLib
\ No newline at end of file
+  DebugLib
diff --git a/SecurityPkg/Library/TcgPpVendorLibNull/TcgPpVendorLibNull.inf b/SecurityPkg/Library/TcgPpVendorLibNull/TcgPpVendorLibNull.inf
index 9674386abd..e2e229df9f 100644
--- a/SecurityPkg/Library/TcgPpVendorLibNull/TcgPpVendorLibNull.inf
+++ b/SecurityPkg/Library/TcgPpVendorLibNull/TcgPpVendorLibNull.inf
@@ -23,7 +23,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 
 [Sources]
@@ -34,4 +34,4 @@
   SecurityPkg/SecurityPkg.dec
   
 [LibraryClasses]
-  DebugLib
\ No newline at end of file
+  DebugLib
diff --git a/SecurityPkg/Library/Tpm12CommandLib/Tpm12CommandLib.inf b/SecurityPkg/Library/Tpm12CommandLib/Tpm12CommandLib.inf
index f5dbb721b8..aad6e57da6 100644
--- a/SecurityPkg/Library/Tpm12CommandLib/Tpm12CommandLib.inf
+++ b/SecurityPkg/Library/Tpm12CommandLib/Tpm12CommandLib.inf
@@ -25,7 +25,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/Tpm12DeviceLibDTpm/Tpm12DeviceLibDTpm.inf b/SecurityPkg/Library/Tpm12DeviceLibDTpm/Tpm12DeviceLibDTpm.inf
index 30b399499e..301984ce08 100644
--- a/SecurityPkg/Library/Tpm12DeviceLibDTpm/Tpm12DeviceLibDTpm.inf
+++ b/SecurityPkg/Library/Tpm12DeviceLibDTpm/Tpm12DeviceLibDTpm.inf
@@ -27,7 +27,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources]
@@ -45,4 +45,4 @@
   DebugLib
 
 [Pcd]
-  gEfiSecurityPkgTokenSpaceGuid.PcdTpmBaseAddress               ## CONSUMES
\ No newline at end of file
+  gEfiSecurityPkgTokenSpaceGuid.PcdTpmBaseAddress               ## CONSUMES
diff --git a/SecurityPkg/Library/Tpm12DeviceLibTcg/Tpm12DeviceLibTcg.inf b/SecurityPkg/Library/Tpm12DeviceLibTcg/Tpm12DeviceLibTcg.inf
index 76ea4924a4..78d710030a 100644
--- a/SecurityPkg/Library/Tpm12DeviceLibTcg/Tpm12DeviceLibTcg.inf
+++ b/SecurityPkg/Library/Tpm12DeviceLibTcg/Tpm12DeviceLibTcg.inf
@@ -21,12 +21,12 @@
   FILE_GUID                      = 4D8B77D9-E923-48f8-B070-4053D78B7E56
   MODULE_TYPE                    = BASE
   VERSION_STRING                 = 1.0
-  LIBRARY_CLASS                  = Tpm12DeviceLib|DXE_DRIVER DXE_RUNTIME_DRIVER DXE_SAL_DRIVER UEFI_APPLICATION UEFI_DRIVER 
+  LIBRARY_CLASS                  = Tpm12DeviceLib|DXE_DRIVER DXE_RUNTIME_DRIVER UEFI_APPLICATION UEFI_DRIVER
 
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2CommandLib.inf b/SecurityPkg/Library/Tpm2CommandLib/Tpm2CommandLib.inf
index 481a878671..d0138a812f 100644
--- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2CommandLib.inf
+++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2CommandLib.inf
@@ -25,7 +25,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpm.inf b/SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpm.inf
index 3e619b98b7..1c73e335d4 100644
--- a/SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpm.inf
+++ b/SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpm.inf
@@ -32,7 +32,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2InstanceLibDTpm.inf b/SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2InstanceLibDTpm.inf
index 22efb1ef4c..56ed69f363 100644
--- a/SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2InstanceLibDTpm.inf
+++ b/SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2InstanceLibDTpm.inf
@@ -28,7 +28,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/Tpm2DeviceLibRouter/Tpm2DeviceLibRouterDxe.inf b/SecurityPkg/Library/Tpm2DeviceLibRouter/Tpm2DeviceLibRouterDxe.inf
index 28f381c7be..5a3adb0638 100644
--- a/SecurityPkg/Library/Tpm2DeviceLibRouter/Tpm2DeviceLibRouterDxe.inf
+++ b/SecurityPkg/Library/Tpm2DeviceLibRouter/Tpm2DeviceLibRouterDxe.inf
@@ -22,12 +22,12 @@
   FILE_GUID                      = C3D69D87-5200-4aab-A6DB-2569BA1A92FC
   MODULE_TYPE                    = DXE_DRIVER
   VERSION_STRING                 = 1.0
-  LIBRARY_CLASS                  = Tpm2DeviceLib|DXE_DRIVER DXE_RUNTIME_DRIVER DXE_SAL_DRIVER DXE_SMM_DRIVER UEFI_APPLICATION UEFI_DRIVER 
+  LIBRARY_CLASS                  = Tpm2DeviceLib|DXE_DRIVER DXE_RUNTIME_DRIVER DXE_SMM_DRIVER UEFI_APPLICATION UEFI_DRIVER
 
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/Tpm2DeviceLibRouter/Tpm2DeviceLibRouterPei.inf b/SecurityPkg/Library/Tpm2DeviceLibRouter/Tpm2DeviceLibRouterPei.inf
index 2eca146dd2..6dee67bb31 100644
--- a/SecurityPkg/Library/Tpm2DeviceLibRouter/Tpm2DeviceLibRouterPei.inf
+++ b/SecurityPkg/Library/Tpm2DeviceLibRouter/Tpm2DeviceLibRouterPei.inf
@@ -27,7 +27,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources]
@@ -46,4 +46,4 @@
 
 [Pcd]
   gEfiSecurityPkgTokenSpaceGuid.PcdTpmInstanceGuid        ## CONSUMES
-  
\ No newline at end of file
+
diff --git a/SecurityPkg/Library/Tpm2DeviceLibTcg2/Tpm2DeviceLibTcg2.inf b/SecurityPkg/Library/Tpm2DeviceLibTcg2/Tpm2DeviceLibTcg2.inf
index 6d95ebdd50..2458ada95b 100644
--- a/SecurityPkg/Library/Tpm2DeviceLibTcg2/Tpm2DeviceLibTcg2.inf
+++ b/SecurityPkg/Library/Tpm2DeviceLibTcg2/Tpm2DeviceLibTcg2.inf
@@ -21,12 +21,12 @@
   FILE_GUID                      = A1B0B230-67DC-431E-A94A-A96AF1EBE637
   MODULE_TYPE                    = DXE_DRIVER
   VERSION_STRING                 = 1.0
-  LIBRARY_CLASS                  = Tpm2DeviceLib|DXE_DRIVER DXE_RUNTIME_DRIVER DXE_SAL_DRIVER DXE_SMM_DRIVER UEFI_APPLICATION UEFI_DRIVER 
+  LIBRARY_CLASS                  = Tpm2DeviceLib|DXE_DRIVER DXE_RUNTIME_DRIVER DXE_SMM_DRIVER UEFI_APPLICATION UEFI_DRIVER
 
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources]
diff --git a/SecurityPkg/Library/TpmCommLib/TpmCommLib.inf b/SecurityPkg/Library/TpmCommLib/TpmCommLib.inf
index 7f05f59711..fe4d9c6dd4 100644
--- a/SecurityPkg/Library/TpmCommLib/TpmCommLib.inf
+++ b/SecurityPkg/Library/TpmCommLib/TpmCommLib.inf
@@ -26,7 +26,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources]
diff --git a/SecurityPkg/SecurityPkg.dsc b/SecurityPkg/SecurityPkg.dsc
index 9f1a91e5a9..12994439f0 100644
--- a/SecurityPkg/SecurityPkg.dsc
+++ b/SecurityPkg/SecurityPkg.dsc
@@ -19,7 +19,7 @@
   PLATFORM_VERSION               = 0.98
   DSC_SPECIFICATION              = 0x00010005
   OUTPUT_DIRECTORY               = Build/SecurityPkg
-  SUPPORTED_ARCHITECTURES        = IA32|IPF|X64|EBC|ARM|AARCH64
+  SUPPORTED_ARCHITECTURES        = IA32|X64|EBC|ARM|AARCH64
   BUILD_TARGETS                  = DEBUG|RELEASE|NOOPT
   SKUID_IDENTIFIER               = DEFAULT
 
@@ -116,13 +116,6 @@
   Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibTcg/Tpm12DeviceLibTcg.inf
   Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibTcg2/Tpm2DeviceLibTcg2.inf
 
-[LibraryClasses.IPF.DXE_SAL_DRIVER]
-  ExtendedSalLib|MdePkg/Library/DxeRuntimeExtendedSalLib/DxeRuntimeExtendedSalLib.inf
-  BaseCryptLib|CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/BaseCryptLibRuntimeCryptProtocol.inf
-  HashLib|SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.inf
-  Tpm12DeviceLib|SecurityPkg/Library/Tpm12DeviceLibTcg/Tpm12DeviceLibTcg.inf
-  Tpm2DeviceLib|SecurityPkg/Library/Tpm2DeviceLibTcg2/Tpm2DeviceLibTcg2.inf
-
 [LibraryClasses.common.DXE_SMM_DRIVER]
   HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf
   SmmServicesTableLib|MdePkg/Library/SmmServicesTableLib/SmmServicesTableLib.inf
@@ -203,10 +196,10 @@
   SecurityPkg/Library/FmpAuthenticationLibPkcs7/FmpAuthenticationLibPkcs7.inf
   SecurityPkg/Library/FmpAuthenticationLibRsa2048Sha256/FmpAuthenticationLibRsa2048Sha256.inf
 
-[Components.IA32, Components.X64, Components.IPF, Components.ARM, Components.AARCH64]
+[Components.IA32, Components.X64, Components.ARM, Components.AARCH64]
   SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf
 
-[Components.IA32, Components.X64, Components.IPF]
+[Components.IA32, Components.X64]
 #  SecurityPkg/UserIdentification/PwdCredentialProviderDxe/PwdCredentialProviderDxe.inf
 #  SecurityPkg/UserIdentification/UsbCredentialProviderDxe/UsbCredentialProviderDxe.inf
   SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
@@ -281,9 +274,6 @@
   SecurityPkg/Tcg/Opal/OpalPassword/OpalPasswordDxe.inf
   SecurityPkg/Tcg/Opal/OpalPassword/OpalPasswordPei.inf
 
-[Components.IPF]
-  SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/EsalVariableDxeSal.inf
-
 [BuildOptions]
    MSFT:*_*_IA32_DLINK_FLAGS = /ALIGN:256
   INTEL:*_*_IA32_DLINK_FLAGS = /ALIGN:256
diff --git a/SecurityPkg/Tcg/MemoryOverwriteControl/TcgMor.inf b/SecurityPkg/Tcg/MemoryOverwriteControl/TcgMor.inf
index a131342bb6..3266450901 100644
--- a/SecurityPkg/Tcg/MemoryOverwriteControl/TcgMor.inf
+++ b/SecurityPkg/Tcg/MemoryOverwriteControl/TcgMor.inf
@@ -28,7 +28,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 
 [Sources]
diff --git a/SecurityPkg/Tcg/MemoryOverwriteRequestControlLock/TcgMorLockSmm.inf b/SecurityPkg/Tcg/MemoryOverwriteRequestControlLock/TcgMorLockSmm.inf
index 1623bd03bb..607e0730af 100644
--- a/SecurityPkg/Tcg/MemoryOverwriteRequestControlLock/TcgMorLockSmm.inf
+++ b/SecurityPkg/Tcg/MemoryOverwriteRequestControlLock/TcgMorLockSmm.inf
@@ -29,7 +29,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 
 [Sources]
diff --git a/SecurityPkg/Tcg/Opal/OpalPassword/OpalPasswordDxe.inf b/SecurityPkg/Tcg/Opal/OpalPassword/OpalPasswordDxe.inf
index 0ac550a728..0a82f30959 100644
--- a/SecurityPkg/Tcg/Opal/OpalPassword/OpalPasswordDxe.inf
+++ b/SecurityPkg/Tcg/Opal/OpalPassword/OpalPasswordDxe.inf
@@ -25,7 +25,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 
 [Sources]
diff --git a/SecurityPkg/Tcg/PhysicalPresencePei/PhysicalPresencePei.inf b/SecurityPkg/Tcg/PhysicalPresencePei/PhysicalPresencePei.inf
index cac1abea34..384acc5207 100644
--- a/SecurityPkg/Tcg/PhysicalPresencePei/PhysicalPresencePei.inf
+++ b/SecurityPkg/Tcg/PhysicalPresencePei/PhysicalPresencePei.inf
@@ -29,7 +29,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources]
@@ -61,4 +61,4 @@
 
 [UserExtensions.TianoCore."ExtraFiles"]
   PhysicalPresencePeiExtra.uni
-  
\ No newline at end of file
+
diff --git a/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf b/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf
index 38fa331701..a61edbea07 100644
--- a/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf
+++ b/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf
@@ -25,7 +25,7 @@
   UNLOAD_IMAGE                   = Tcg2ConfigDriverUnload
 
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 
 [Sources]
diff --git a/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf b/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
index 8dd0b63e48..12469cb9bd 100644
--- a/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
+++ b/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
@@ -24,7 +24,7 @@
   ENTRY_POINT                    = Tcg2ConfigPeimEntryPoint
 
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 # [BootMode]
 #   S3_RESUME                 ## SOMETIMES_CONSUMES
diff --git a/SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf b/SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf
index 59d6dc3dfb..be78c872b2 100644
--- a/SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf
+++ b/SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf
@@ -36,7 +36,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources]
diff --git a/SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf b/SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf
index a4aae1488f..ce09bd304d 100644
--- a/SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf
+++ b/SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf
@@ -31,7 +31,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 # [BootMode]
 #   S3_RESUME                 ## SOMETIMES_CONSUMES
diff --git a/SecurityPkg/Tcg/TcgConfigDxe/TcgConfigDxe.inf b/SecurityPkg/Tcg/TcgConfigDxe/TcgConfigDxe.inf
index 82fc35eea0..c2423316af 100644
--- a/SecurityPkg/Tcg/TcgConfigDxe/TcgConfigDxe.inf
+++ b/SecurityPkg/Tcg/TcgConfigDxe/TcgConfigDxe.inf
@@ -23,7 +23,7 @@
   UNLOAD_IMAGE                   = TcgConfigDriverUnload
 
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 
 [Sources]
diff --git a/SecurityPkg/Tcg/TcgDxe/TcgDxe.inf b/SecurityPkg/Tcg/TcgDxe/TcgDxe.inf
index 1b96ecbe2a..4223462d16 100644
--- a/SecurityPkg/Tcg/TcgDxe/TcgDxe.inf
+++ b/SecurityPkg/Tcg/TcgDxe/TcgDxe.inf
@@ -24,7 +24,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF
+#  VALID_ARCHITECTURES           = IA32 X64
 #
 
 [Sources]
@@ -83,4 +83,4 @@
 
 [UserExtensions.TianoCore."ExtraFiles"]
   TcgDxeExtra.uni
-  
\ No newline at end of file
+
diff --git a/SecurityPkg/Tcg/TcgPei/TcgPei.inf b/SecurityPkg/Tcg/TcgPei/TcgPei.inf
index 57ce7263e9..3bac54de01 100644
--- a/SecurityPkg/Tcg/TcgPei/TcgPei.inf
+++ b/SecurityPkg/Tcg/TcgPei/TcgPei.inf
@@ -26,7 +26,7 @@
 #
 # The following information is for reference only and not required by the build tools.
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 # [BootMode]
 #   S3_RESUME                 ## SOMETIMES_CONSUMES
@@ -89,4 +89,4 @@
 
 [UserExtensions.TianoCore."ExtraFiles"]
   TcgPeiExtra.uni
-  
\ No newline at end of file
+
diff --git a/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/AuthService.c b/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/AuthService.c
deleted file mode 100644
index 490a8b3417..0000000000
--- a/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/AuthService.c
+++ /dev/null
@@ -1,886 +0,0 @@
-/** @file
-  Implement authentication services for the authenticated variable
-  service in UEFI2.2.
-
-Copyright (c) 2009 - 2014, Intel Corporation. All rights reserved.<BR>
-This program and the accompanying materials 
-are licensed and made available under the terms and conditions of the BSD License 
-which accompanies this distribution.  The full text of the license may be found at 
-http://opensource.org/licenses/bsd-license.php
-
-THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, 
-WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
-
-**/
-
-#include "Variable.h"
-#include "AuthService.h"
-
-///
-/// Global database array for scratch
-///
-UINT32   mPubKeyNumber;
-UINT32   mPlatformMode;
-EFI_GUID mSignatureSupport[SIGSUPPORT_NUM] = {EFI_CERT_RSA2048_SHA256_GUID, EFI_CERT_RSA2048_SHA1_GUID};
-//
-// Public Exponent of RSA Key.
-//
-CONST UINT8 mRsaE[] = { 0x01, 0x00, 0x01 };
-
-/**
-  Initializes for authenticated varibale service.
-
-  @retval EFI_SUCCESS           The function successfully executed.
-  @retval EFI_OUT_OF_RESOURCES  Failed to allocate enough memory resources.
-
-**/
-EFI_STATUS
-AutenticatedVariableServiceInitialize (
-  VOID
-  )
-{
-  EFI_STATUS                        Status;
-  VARIABLE_POINTER_TRACK            Variable;
-  UINT8                             VarValue;
-  UINT32                            VarAttr;
-  UINTN                             DataSize;
-  UINTN                             CtxSize;
-  AUTHENTICATED_VARIABLE_HEADER     VariableHeader;
-  BOOLEAN                           Valid;
-
-  ZeroMem (&VariableHeader, sizeof (AUTHENTICATED_VARIABLE_HEADER));
-
-  mVariableModuleGlobal->AuthenticatedVariableGuid[Physical] = &gEfiAuthenticatedVariableGuid;
-  mVariableModuleGlobal->CertRsa2048Sha256Guid[Physical]     = &gEfiCertRsa2048Sha256Guid;
-  mVariableModuleGlobal->ImageSecurityDatabaseGuid[Physical] = &gEfiImageSecurityDatabaseGuid;
-
-  //
-  // Initialize hash context.
-  //
-  CtxSize   = Sha256GetContextSize ();
-  mVariableModuleGlobal->HashContext[Physical] = AllocateRuntimePool (CtxSize);
-  ASSERT (mVariableModuleGlobal->HashContext[Physical] != NULL);
-  //
-  // Check "AuthVarKeyDatabase" variable's existence. 
-  // If it doesn't exist, create a new one with initial value of 0 and EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS set. 
-  //
-  Status = FindVariable (
-             mVariableModuleGlobal->VariableName[Physical][VAR_AUTH_KEY_DB], 
-             &gEfiAuthenticatedVariableGuid, 
-             &Variable, 
-             &mVariableModuleGlobal->VariableGlobal[Physical],
-             mVariableModuleGlobal->FvbInstance
-             );
-
-  if (Variable.CurrPtr == 0x0) {
-    VarAttr       = EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS;
-    VarValue      = 0;
-    mPubKeyNumber = 0;
-    Status        = UpdateVariable (
-                      mVariableModuleGlobal->VariableName[Physical][VAR_AUTH_KEY_DB],
-                      &gEfiAuthenticatedVariableGuid,
-                      &VarValue,
-                      sizeof(UINT8),
-                      VarAttr,
-                      0,
-                      0,
-                      FALSE,
-                      mVariableModuleGlobal,
-                      &Variable
-                      );
-    if (EFI_ERROR (Status)) {
-      return Status;
-    }
-  } else {
-    //
-    // Load database in global variable for cache.
-    //
-    Valid = IsValidVariableHeader (
-              Variable.CurrPtr, 
-              Variable.Volatile, 
-              &mVariableModuleGlobal->VariableGlobal[Physical], 
-              mVariableModuleGlobal->FvbInstance, 
-              &VariableHeader
-              );
-    ASSERT (Valid);
-
-    DataSize  = DataSizeOfVariable (&VariableHeader);
-    ASSERT (DataSize <= MAX_KEYDB_SIZE);
-    GetVariableDataPtr (
-      Variable.CurrPtr,
-      Variable.Volatile,
-      &mVariableModuleGlobal->VariableGlobal[Physical],
-      mVariableModuleGlobal->FvbInstance,
-      (CHAR16 *) mVariableModuleGlobal->PubKeyStore
-      );
-
-    mPubKeyNumber = (UINT32) (DataSize / EFI_CERT_TYPE_RSA2048_SIZE);
-  }
-  //
-  // Check "SetupMode" variable's existence. 
-  // If it doesn't exist, check PK database's existence to determine the value.
-  // Then create a new one with EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS set. 
-  //
-  Status = FindVariable (
-             mVariableModuleGlobal->VariableName[Physical][VAR_SETUP_MODE], 
-             &gEfiGlobalVariableGuid, 
-             &Variable, 
-             &mVariableModuleGlobal->VariableGlobal[Physical],
-             mVariableModuleGlobal->FvbInstance
-             );
-
-  if (Variable.CurrPtr == 0x0) {
-    Status = FindVariable (
-               mVariableModuleGlobal->VariableName[Physical][VAR_PLATFORM_KEY], 
-               &gEfiGlobalVariableGuid, 
-               &Variable, 
-               &mVariableModuleGlobal->VariableGlobal[Physical],
-               mVariableModuleGlobal->FvbInstance
-               );
-    if (Variable.CurrPtr == 0x0) {
-      mPlatformMode = SETUP_MODE;
-    } else {
-      mPlatformMode = USER_MODE;
-    }
-
-    VarAttr = EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS;
-    Status  = UpdateVariable (
-                mVariableModuleGlobal->VariableName[Physical][VAR_SETUP_MODE],
-                &gEfiGlobalVariableGuid,
-                &mPlatformMode,
-                sizeof(UINT8),
-                VarAttr,
-                0,
-                0,
-                FALSE,
-                mVariableModuleGlobal,
-                &Variable
-                );
-    if (EFI_ERROR (Status)) {
-      return Status;
-    }
-  } else {
-    GetVariableDataPtr (
-      Variable.CurrPtr,
-      Variable.Volatile,
-      &mVariableModuleGlobal->VariableGlobal[Physical],
-      mVariableModuleGlobal->FvbInstance,
-      (CHAR16 *) &mPlatformMode
-      );
-  }
-  //
-  // Check "SignatureSupport" variable's existence. 
-  // If it doesn't exist, then create a new one with EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS set. 
-  //
-  Status = FindVariable (
-             EFI_SIGNATURE_SUPPORT_NAME, 
-             &gEfiGlobalVariableGuid, 
-             &Variable, 
-             &mVariableModuleGlobal->VariableGlobal[Physical],
-             mVariableModuleGlobal->FvbInstance
-             );
-
-  if (Variable.CurrPtr == 0x0) {
-    VarAttr = EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS;
-    Status  = UpdateVariable (
-                EFI_SIGNATURE_SUPPORT_NAME,
-                &gEfiGlobalVariableGuid,
-                mSignatureSupport,
-                SIGSUPPORT_NUM * sizeof(EFI_GUID),
-                VarAttr,
-                0,
-                0,
-                FALSE,
-                mVariableModuleGlobal,
-                &Variable
-                );
-  }
-
-  return Status;
-}
-
-/**
-  Add public key in store and return its index.
-
-  @param[in]  VirtualMode             The current calling mode for this function.
-  @param[in]  Global                  The context of this Extended SAL Variable Services Class call.
-  @param[in]  PubKey                  The input pointer to Public Key data.
-
-  @return                             The index of new added item.
-
-**/
-UINT32
-AddPubKeyInStore (
-  IN  BOOLEAN                   VirtualMode,
-  IN  ESAL_VARIABLE_GLOBAL      *Global,
-  IN  UINT8                     *PubKey
-  )
-{
-  EFI_STATUS              Status;
-  BOOLEAN                 IsFound;
-  UINT32                  Index;
-  VARIABLE_POINTER_TRACK  Variable;
-  UINT8                   *Ptr;
-
-  if (PubKey == NULL) {
-    return 0;
-  }
-
-  Status = FindVariable (
-             Global->VariableName[VirtualMode][VAR_AUTH_KEY_DB],
-             Global->AuthenticatedVariableGuid[VirtualMode],
-             &Variable,
-             &Global->VariableGlobal[VirtualMode],
-             Global->FvbInstance
-             );
-  ASSERT_EFI_ERROR (Status);
-  //
-  // Check whether the public key entry does exist.
-  //
-  IsFound = FALSE;
-  for (Ptr = Global->PubKeyStore, Index = 1; Index <= mPubKeyNumber; Index++) {
-    if (CompareMem (Ptr, PubKey, EFI_CERT_TYPE_RSA2048_SIZE) == 0) {
-      IsFound = TRUE;
-      break;
-    }
-    Ptr += EFI_CERT_TYPE_RSA2048_SIZE;
-  }
-
-  if (!IsFound) {
-    //
-    // Add public key in database.
-    //
-    if (mPubKeyNumber == MAX_KEY_NUM) {
-      //
-      // Notes: Database is full, need enhancement here, currently just return 0.
-      //
-      return 0;
-    }
-
-    CopyMem (Global->PubKeyStore + mPubKeyNumber * EFI_CERT_TYPE_RSA2048_SIZE, PubKey, EFI_CERT_TYPE_RSA2048_SIZE);
-    Index = ++mPubKeyNumber;
-    //
-    // Update public key database variable.
-    //
-    Status = UpdateVariable (
-               Global->VariableName[VirtualMode][VAR_AUTH_KEY_DB],
-               Global->AuthenticatedVariableGuid[VirtualMode],
-               Global->PubKeyStore,
-               mPubKeyNumber * EFI_CERT_TYPE_RSA2048_SIZE,
-               EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS,
-               0,
-               0,
-               VirtualMode,
-               Global,
-               &Variable
-               );
-    ASSERT_EFI_ERROR (Status);
-  }
-
-  return Index;
-}
-
-/**
-  Verify data payload with AuthInfo in EFI_CERT_TYPE_RSA2048_SHA256 type.
-  Follow the steps in UEFI2.2.
-
-  @param[in]  VirtualMode             The current calling mode for this function.
-  @param[in]  Global                  The context of this Extended SAL Variable Services Class call.
-  @param[in]  Data                    The pointer to data with AuthInfo.
-  @param[in]  DataSize                The size of Data.
-  @param[in]  PubKey                  The public key used for verification.
-
-  @retval EFI_INVALID_PARAMETER       Invalid parameter.
-  @retval EFI_SECURITY_VIOLATION      Authentication failed.
-  @retval EFI_SUCCESS                 Authentication successful.
-
-**/
-EFI_STATUS
-VerifyDataPayload (
-  IN  BOOLEAN                   VirtualMode,
-  IN  ESAL_VARIABLE_GLOBAL      *Global,
-  IN  UINT8                     *Data,
-  IN  UINTN                     DataSize,
-  IN  UINT8                     *PubKey
-  )
-{
-  BOOLEAN                         Status;
-  EFI_VARIABLE_AUTHENTICATION     *CertData;
-  EFI_CERT_BLOCK_RSA_2048_SHA256  *CertBlock;
-  UINT8                           Digest[SHA256_DIGEST_SIZE];
-  VOID                            *Rsa;
-  VOID                            *HashContext;
-
-  Rsa         = NULL;
-  CertData    = NULL;
-  CertBlock   = NULL;
-
-  if (Data == NULL || PubKey == NULL) {
-    return EFI_INVALID_PARAMETER;
-  }
-
-  CertData  = (EFI_VARIABLE_AUTHENTICATION *) Data;
-  CertBlock = (EFI_CERT_BLOCK_RSA_2048_SHA256 *) (CertData->AuthInfo.CertData);
-
-  //
-  // wCertificateType should be WIN_CERT_TYPE_EFI_GUID.
-  // Cert type should be EFI_CERT_TYPE_RSA2048_SHA256.
-  //
-  if ((CertData->AuthInfo.Hdr.wCertificateType != WIN_CERT_TYPE_EFI_GUID) ||
-      !CompareGuid (&CertData->AuthInfo.CertType, Global->CertRsa2048Sha256Guid[VirtualMode])
-        ) {
-    //
-    // Invalid AuthInfo type, return EFI_SECURITY_VIOLATION.
-    //
-    return EFI_SECURITY_VIOLATION;
-  }
-
-  //
-  // Hash data payload with SHA256.
-  //
-  ZeroMem (Digest, SHA256_DIGEST_SIZE);
-  HashContext = Global->HashContext[VirtualMode];
-  Status  = Sha256Init (HashContext);
-  if (!Status) {
-    goto Done;
-  }
-  Status  = Sha256Update (HashContext, Data + AUTHINFO_SIZE, (UINTN) (DataSize - AUTHINFO_SIZE));
-  if (!Status) {
-    goto Done;
-  }
-  //
-  // Hash Monotonic Count.
-  //
-  Status  = Sha256Update (HashContext, &CertData->MonotonicCount, sizeof (UINT64));
-  if (!Status) {
-    goto Done;
-  }
-  Status  = Sha256Final (HashContext, Digest);
-  if (!Status) {
-    goto Done;
-  }
-  //
-  // Generate & Initialize RSA Context.
-  //
-  Rsa = RsaNew ();
-  ASSERT (Rsa != NULL);
-  // 
-  // Set RSA Key Components.
-  // NOTE: Only N and E are needed to be set as RSA public key for signature verification.
-  //
-  Status = RsaSetKey (Rsa, RsaKeyN, PubKey, EFI_CERT_TYPE_RSA2048_SIZE);
-  if (!Status) {
-    goto Done;
-  }
-  Status = RsaSetKey (Rsa, RsaKeyE, mRsaE, sizeof (mRsaE));
-  if (!Status) {
-    goto Done;
-  }
-  //
-  // Verify the signature.
-  //
-  Status = RsaPkcs1Verify (
-             Rsa, 
-             Digest, 
-             SHA256_DIGEST_SIZE, 
-             CertBlock->Signature, 
-             EFI_CERT_TYPE_RSA2048_SHA256_SIZE
-             );
-
-Done:
-  if (Rsa != NULL) {
-    RsaFree (Rsa);
-  }
-  if (Status) {
-    return EFI_SUCCESS;
-  } else {
-    return EFI_SECURITY_VIOLATION;
-  }
-}
-
-
-/**
-  Update platform mode.
-
-  @param[in]  VirtualMode             The current calling mode for this function.
-  @param[in]  Global                  The context of this Extended SAL Variable Services Class call.
-  @param[in]  Mode                    SETUP_MODE or USER_MODE.
-
-**/
-VOID
-UpdatePlatformMode (
-  IN  BOOLEAN                   VirtualMode,
-  IN  ESAL_VARIABLE_GLOBAL      *Global,
-  IN  UINT32                    Mode
-  )
-{
-  EFI_STATUS              Status;
-  VARIABLE_POINTER_TRACK  Variable;
-  UINT32                  VarAttr;
-
-  Status = FindVariable (
-             Global->VariableName[VirtualMode][VAR_SETUP_MODE], 
-             Global->GlobalVariableGuid[VirtualMode], 
-             &Variable, 
-             &Global->VariableGlobal[VirtualMode],
-             Global->FvbInstance
-             );
-  ASSERT_EFI_ERROR (Status);
-
-  mPlatformMode  = Mode;
-  VarAttr        = EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS;
-  Status         = UpdateVariable (
-                     Global->VariableName[VirtualMode][VAR_SETUP_MODE],
-                     Global->GlobalVariableGuid[VirtualMode],
-                     &mPlatformMode,
-                     sizeof(UINT8),
-                     VarAttr,
-                     0,
-                     0,
-                     VirtualMode,
-                     Global,
-                     &Variable
-                     );
-  ASSERT_EFI_ERROR (Status);
-}
-
-/**
-  Process variable with platform key for verification.
-
-  @param[in]  VariableName                The name of Variable to be found.
-  @param[in]  VendorGuid                  The variable vendor GUID.
-  @param[in]  Data                        The data pointer.
-  @param[in]  DataSize                    The size of Data found. If size is less than the
-                                          data, this value contains the required size.
-  @param[in]  VirtualMode                 The current calling mode for this function.
-  @param[in]  Global                      The context of this Extended SAL Variable Services Class call.
-  @param[in]  Variable                    The variable information which is used to keep track of variable usage.
-  @param[in]  Attributes                  The attribute value of the variable.
-  @param[in]  IsPk                        Indicates whether to process pk.
-
-  @retval EFI_INVALID_PARAMETER           Invalid parameter.
-  @retval EFI_SECURITY_VIOLATION          The variable does NOT pass the validation 
-                                          check carried out by the firmware. 
-  @retval EFI_SUCCESS                     The variable passed validation successfully.
-
-**/
-EFI_STATUS
-ProcessVarWithPk (
-  IN  CHAR16                    *VariableName,
-  IN  EFI_GUID                  *VendorGuid,
-  IN  VOID                      *Data,
-  IN  UINTN                     DataSize,
-  IN  BOOLEAN                   VirtualMode,
-  IN  ESAL_VARIABLE_GLOBAL      *Global,
-  IN  VARIABLE_POINTER_TRACK    *Variable,
-  IN  UINT32                    Attributes OPTIONAL,
-  IN  BOOLEAN                   IsPk
-  )
-{
-  EFI_STATUS                    Status;
-  VARIABLE_POINTER_TRACK        PkVariable;
-  EFI_SIGNATURE_LIST            *OldPkList;
-  EFI_SIGNATURE_DATA            *OldPkData;
-  EFI_VARIABLE_AUTHENTICATION   *CertData;
-  AUTHENTICATED_VARIABLE_HEADER VariableHeader;
-  BOOLEAN                       Valid;
-
-  OldPkList = NULL;
-  ZeroMem (&VariableHeader, sizeof (AUTHENTICATED_VARIABLE_HEADER));
-
-  if ((Attributes & EFI_VARIABLE_NON_VOLATILE) == 0) {
-    //
-    // PK and KEK should set EFI_VARIABLE_NON_VOLATILE attribute.
-    //
-    return EFI_INVALID_PARAMETER;
-  }
-
-  if (mPlatformMode == USER_MODE) {
-    if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) == 0) {
-      //
-      // In user mode, PK and KEK should set EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS attribute.
-      //
-      return EFI_INVALID_PARAMETER;
-    }
-
-    CertData = (EFI_VARIABLE_AUTHENTICATION *) Data;
-
-    if (Variable->CurrPtr != 0x0) {
-      Valid = IsValidVariableHeader (
-                Variable->CurrPtr, 
-                Variable->Volatile, 
-                &Global->VariableGlobal[VirtualMode], 
-                Global->FvbInstance, 
-                &VariableHeader
-                );
-      ASSERT (Valid);
-
-      if (CertData->MonotonicCount <= VariableHeader.MonotonicCount) {
-        //
-        // Monotonic count check fail, suspicious replay attack, return EFI_SECURITY_VIOLATION.
-        //
-        return EFI_SECURITY_VIOLATION;
-      }
-    }
-    //
-    // Get platform key from variable.
-    //
-    Status = FindVariable (
-               Global->VariableName[VirtualMode][VAR_PLATFORM_KEY], 
-               Global->GlobalVariableGuid[VirtualMode], 
-               &PkVariable, 
-               &Global->VariableGlobal[VirtualMode],
-               Global->FvbInstance
-               );
-    ASSERT_EFI_ERROR (Status);
-
-    ZeroMem (Global->KeyList, MAX_KEYDB_SIZE);
-    GetVariableDataPtr (
-      PkVariable.CurrPtr,
-      PkVariable.Volatile,
-      &Global->VariableGlobal[VirtualMode],
-      Global->FvbInstance,
-      (CHAR16 *) Global->KeyList
-      );
-
-    OldPkList = (EFI_SIGNATURE_LIST *) Global->KeyList;
-    OldPkData = (EFI_SIGNATURE_DATA *) ((UINT8 *) OldPkList + sizeof (EFI_SIGNATURE_LIST) + OldPkList->SignatureHeaderSize);
-    Status    = VerifyDataPayload (VirtualMode, Global, Data, DataSize, OldPkData->SignatureData);
-    if (!EFI_ERROR (Status)) {
-      Status = UpdateVariable (
-                 VariableName, 
-                 VendorGuid, 
-                 (UINT8*)Data + AUTHINFO_SIZE, 
-                 DataSize - AUTHINFO_SIZE, 
-                 Attributes, 
-                 0, 
-                 CertData->MonotonicCount, 
-                 VirtualMode, 
-                 Global,
-                 Variable
-                 );
-
-      if (!EFI_ERROR (Status)) {
-        //
-        // If delete PK in user mode, need change to setup mode.
-        //
-        if ((DataSize == AUTHINFO_SIZE) && IsPk) {
-          UpdatePlatformMode (VirtualMode, Global, SETUP_MODE);
-        }
-      }
-    }
-  } else {
-    Status = UpdateVariable (VariableName, VendorGuid, Data, DataSize, Attributes, 0, 0, VirtualMode, Global, Variable);
-    //
-    // If enroll PK in setup mode, need change to user mode.
-    //
-    if ((DataSize != 0) && IsPk) {
-      UpdatePlatformMode (VirtualMode, Global, USER_MODE);
-    }
-  }
-
-  return Status;
-}
-
-/**
-  Process variable with key exchange key for verification.
-
-  @param[in]  VariableName                The name of Variable to be found.
-  @param[in]  VendorGuid                  The variable vendor GUID.
-  @param[in]  Data                        The data pointer.
-  @param[in]  DataSize                    The size of Data found. If size is less than the
-                                          data, this value contains the required size.
-  @param[in]  VirtualMode                 The current calling mode for this function.
-  @param[in]  Global                      The context of this Extended SAL Variable Services Class call.
-  @param[in]  Variable                    The variable information which is used to keep track of variable usage.
-  @param[in]  Attributes                  The attribute value of the variable.
-
-  @retval EFI_INVALID_PARAMETER           Invalid parameter.
-  @retval EFI_SECURITY_VIOLATION          The variable did NOT pass the validation 
-                                          check carried out by the firmware. 
-  @retval EFI_SUCCESS                     The variable passed validation successfully.
-
-**/
-EFI_STATUS
-ProcessVarWithKek (
-  IN  CHAR16                               *VariableName,
-  IN  EFI_GUID                             *VendorGuid,
-  IN  VOID                                 *Data,
-  IN  UINTN                                DataSize,
-  IN  BOOLEAN                              VirtualMode,
-  IN  ESAL_VARIABLE_GLOBAL                 *Global,
-  IN  VARIABLE_POINTER_TRACK               *Variable,
-  IN  UINT32                               Attributes OPTIONAL
-  )
-{
-  EFI_STATUS                      Status;
-  VARIABLE_POINTER_TRACK          KekVariable;
-  EFI_SIGNATURE_LIST              *KekList;
-  EFI_SIGNATURE_DATA              *KekItem;
-  UINT32                          KekCount;
-  EFI_VARIABLE_AUTHENTICATION     *CertData;
-  EFI_CERT_BLOCK_RSA_2048_SHA256  *CertBlock;
-  BOOLEAN                         IsFound;
-  UINT32                          Index;
-  AUTHENTICATED_VARIABLE_HEADER   VariableHeader;
-  BOOLEAN                         Valid;
-
-  KekList = NULL;
-  ZeroMem (&VariableHeader, sizeof (AUTHENTICATED_VARIABLE_HEADER));
-
-  if (mPlatformMode == USER_MODE) {
-    if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) == 0) {
-      //
-      // In user mode, should set EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS attribute.
-      //
-      return EFI_INVALID_PARAMETER;
-    }
-
-    CertData  = (EFI_VARIABLE_AUTHENTICATION *) Data;
-    CertBlock = (EFI_CERT_BLOCK_RSA_2048_SHA256 *) (CertData->AuthInfo.CertData);
-    if (Variable->CurrPtr != 0x0) {
-      Valid = IsValidVariableHeader (
-                Variable->CurrPtr, 
-                Variable->Volatile, 
-                &Global->VariableGlobal[VirtualMode], 
-                Global->FvbInstance, 
-                &VariableHeader
-                );
-      ASSERT (Valid);
-
-      if (CertData->MonotonicCount <= VariableHeader.MonotonicCount) {
-        //
-        // Monotonic count check fail, suspicious replay attack, return EFI_SECURITY_VIOLATION.
-        //
-        return EFI_SECURITY_VIOLATION;
-      }
-    }
-    //
-    // Get KEK database from variable.
-    //
-    Status = FindVariable (
-               Global->VariableName[VirtualMode][VAR_KEY_EXCHANGE_KEY], 
-               Global->GlobalVariableGuid[VirtualMode], 
-               &KekVariable, 
-               &Global->VariableGlobal[VirtualMode],
-               Global->FvbInstance
-               );
-    ASSERT_EFI_ERROR (Status);
-
-    ZeroMem (Global->KeyList, MAX_KEYDB_SIZE);
-    GetVariableDataPtr (
-      KekVariable.CurrPtr,
-      KekVariable.Volatile,
-      &Global->VariableGlobal[VirtualMode],
-      Global->FvbInstance,
-      (CHAR16 *) Global->KeyList
-      );
-    //
-    // Enumerate all Kek items in this list to verify the variable certificate data.
-    // If anyone is authenticated successfully, it means the variable is correct!
-    //
-    KekList   = (EFI_SIGNATURE_LIST *) Global->KeyList;
-    IsFound   = FALSE;
-    KekCount  = (KekList->SignatureListSize - sizeof (EFI_SIGNATURE_LIST) - KekList->SignatureHeaderSize) / KekList->SignatureSize;
-    KekItem   = (EFI_SIGNATURE_DATA *) ((UINT8 *) KekList + sizeof (EFI_SIGNATURE_LIST) + KekList->SignatureHeaderSize);
-    for (Index = 0; Index < KekCount; Index++) {
-      if (CompareMem (KekItem->SignatureData, CertBlock->PublicKey, EFI_CERT_TYPE_RSA2048_SIZE) == 0) {
-        IsFound = TRUE;
-        break;
-      }
-      KekItem = (EFI_SIGNATURE_DATA *) ((UINT8 *) KekItem + KekList->SignatureSize);
-    }
-
-    if (!IsFound) {
-      return EFI_SECURITY_VIOLATION;
-    }
-
-    Status = VerifyDataPayload (VirtualMode, Global, Data, DataSize, CertBlock->PublicKey);
-    if (!EFI_ERROR (Status)) {
-      Status = UpdateVariable (
-                 VariableName, 
-                 VendorGuid, 
-                 (UINT8*)Data + AUTHINFO_SIZE, 
-                 DataSize - AUTHINFO_SIZE, 
-                 Attributes, 
-                 0, 
-                 CertData->MonotonicCount, 
-                 VirtualMode,
-                 Global,
-                 Variable
-                 );
-    }
-  } else {
-    //
-    // If in setup mode, no authentication needed.
-    //
-    Status = UpdateVariable (
-               VariableName, 
-               VendorGuid, 
-               Data, 
-               DataSize, 
-               Attributes, 
-               0, 
-               0, 
-               VirtualMode,
-               Global,
-               Variable
-               );
-  }
-
-  return Status;
-}
-
-/**
-  Process variable with EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS set, and return the index of associated public key.
-
-  @param[in]  Data                        The data pointer.
-  @param[in]  DataSize                    The size of Data found. If size is less than the
-                                          data, this value contains the required size.
-  @param[in]  VirtualMode                 The current calling mode for this function.
-  @param[in]  Global                      The context of this Extended SAL Variable Services Class call.
-  @param[in]  Variable                    The variable information which is used to keep track of variable usage.
-  @param[in]  Attributes                  The attribute value of the variable.
-  @param[out] KeyIndex                    The output index of corresponding public key in database.
-  @param[out] MonotonicCount              The output value of corresponding Monotonic Count.
-
-  @retval EFI_INVALID_PARAMETER           Invalid parameter.
-  @retval EFI_WRITE_PROTECTED             The variable is write-protected and needs authentication with
-                                          EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS set.
-  @retval EFI_SECURITY_VIOLATION          The variable is with EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS
-                                          set, but the AuthInfo does NOT pass the validation 
-                                          check carried out by the firmware. 
-  @retval EFI_SUCCESS                     The variable is not write-protected, or passed validation successfully.
-
-**/
-EFI_STATUS
-VerifyVariable (
-  IN  VOID                      *Data,
-  IN  UINTN                     DataSize,
-  IN  BOOLEAN                   VirtualMode,
-  IN  ESAL_VARIABLE_GLOBAL      *Global,
-  IN  VARIABLE_POINTER_TRACK    *Variable,
-  IN  UINT32                    Attributes OPTIONAL,
-  OUT UINT32                    *KeyIndex OPTIONAL,
-  OUT UINT64                    *MonotonicCount OPTIONAL
-  )
-{
-  EFI_STATUS                      Status;
-  BOOLEAN                         IsDeletion;
-  BOOLEAN                         IsFirstTime;
-  UINT8                           *PubKey;
-  EFI_VARIABLE_AUTHENTICATION     *CertData;
-  EFI_CERT_BLOCK_RSA_2048_SHA256  *CertBlock;
-  AUTHENTICATED_VARIABLE_HEADER   VariableHeader;
-  BOOLEAN                         Valid;
-
-  CertData    = NULL;
-  CertBlock   = NULL;
-  PubKey      = NULL;
-  IsDeletion  = FALSE;
-  Valid       = FALSE;
-
-  if (KeyIndex != NULL) {
-    *KeyIndex = 0;
-  }
-  //
-  // Determine if first time SetVariable with the EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS.
-  //
-  ZeroMem (&VariableHeader, sizeof (AUTHENTICATED_VARIABLE_HEADER));
-  if (Variable->CurrPtr != 0x0) {
-    Valid = IsValidVariableHeader (
-              Variable->CurrPtr, 
-              Variable->Volatile, 
-              &Global->VariableGlobal[VirtualMode], 
-              Global->FvbInstance, 
-              &VariableHeader
-              );
-    ASSERT (Valid);
-  }
-
-  if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) != 0) {
-    if (KeyIndex == NULL) {
-      return EFI_INVALID_PARAMETER;
-    }
-
-    //
-    // Determine current operation type.
-    //
-    if (DataSize == AUTHINFO_SIZE) {
-      IsDeletion = TRUE;
-    }
-    //
-    // Determine whether this is the first time with EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS set.
-    //
-    if (Variable->CurrPtr == 0x0) {
-      IsFirstTime = TRUE;
-    } else if (Valid &&(VariableHeader.Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) == 0) {
-      IsFirstTime = TRUE;
-    } else {
-      *KeyIndex   = VariableHeader.PubKeyIndex;
-      IsFirstTime = FALSE;
-    }
-  } else if (Valid && (VariableHeader.Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) != 0) { 
-      //
-      // If the variable is already write-protected, it always needs authentication before update.
-      //
-      return EFI_WRITE_PROTECTED;
-  } else {
-    //
-    // If without EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS, set and attributes collision.
-    // That means it is not authenticated variable, just return EFI_SUCCESS.
-    //
-    return EFI_SUCCESS;
-  }
-
-  //
-  // Get PubKey and check Monotonic Count value corresponding to the variable.
-  //
-  CertData  = (EFI_VARIABLE_AUTHENTICATION *) Data;
-  CertBlock = (EFI_CERT_BLOCK_RSA_2048_SHA256 *) (CertData->AuthInfo.CertData);
-  PubKey    = CertBlock->PublicKey;
-
-  if (MonotonicCount != NULL) {
-    //
-    // Update Monotonic Count value.
-    //
-    *MonotonicCount = CertData->MonotonicCount;
-  }
-
-  if (!IsFirstTime) {
-    //
-    // Check input PubKey.
-    //
-    if (CompareMem (PubKey, Global->PubKeyStore + (*KeyIndex - 1) * EFI_CERT_TYPE_RSA2048_SIZE, EFI_CERT_TYPE_RSA2048_SIZE) != 0) {
-      return EFI_SECURITY_VIOLATION;
-    }
-    //
-    // Compare the current monotonic count and ensure that it is greater than the last SetVariable
-    // operation with the EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS attribute set.
-    //
-    if (CertData->MonotonicCount <= VariableHeader.MonotonicCount) {
-      //
-      // Monotonic count check fail, suspicious replay attack, return EFI_SECURITY_VIOLATION.
-      //
-      return EFI_SECURITY_VIOLATION;
-    }
-  } 
-  //
-  // Verify the certificate in Data payload.
-  //
-  Status = VerifyDataPayload (VirtualMode, Global, Data, DataSize, PubKey);
-  if (!EFI_ERROR (Status)) {
-    //
-    // Now, the signature has been verified!
-    //
-    if (IsFirstTime && !IsDeletion) {
-      //
-      // Update public key database variable if need and return the index.
-      //
-      *KeyIndex = AddPubKeyInStore (VirtualMode, Global, PubKey);
-    }
-  }
-
-  return Status;
-}
-
diff --git a/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/AuthService.h b/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/AuthService.h
deleted file mode 100644
index f3e15f61e2..0000000000
--- a/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/AuthService.h
+++ /dev/null
@@ -1,151 +0,0 @@
-/** @file
-  The internal header file includes the common header files, defines
-  internal structure and functions used by AuthService module.
-
-Copyright (c) 2009 - 2011, Intel Corporation. All rights reserved.<BR>
-This program and the accompanying materials 
-are licensed and made available under the terms and conditions of the BSD License 
-which accompanies this distribution.  The full text of the license may be found at 
-http://opensource.org/licenses/bsd-license.php
-
-THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, 
-WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
-
-**/
-
-#ifndef _AUTHSERVICE_H_
-#define _AUTHSERVICE_H_
-
-#define EFI_CERT_TYPE_RSA2048_SHA256_SIZE 256
-#define EFI_CERT_TYPE_RSA2048_SIZE        256
-
-///
-/// Size of AuthInfo prior to the data payload
-///
-#define AUTHINFO_SIZE (((UINTN)(((EFI_VARIABLE_AUTHENTICATION *) 0)->AuthInfo.CertData)) + sizeof (EFI_CERT_BLOCK_RSA_2048_SHA256))
-
-///
-/// Item number of support signature types.
-///
-#define SIGSUPPORT_NUM 2
-
-/**
-  Process variable with EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS set, and return the index of associated public key.
-
-  @param[in]  Data                        The data pointer.
-  @param[in]  DataSize                    The size of Data found. If size is less than the
-                                          data, this value contains the required size.
-  @param[in]  VirtualMode                 The current calling mode for this function.
-  @param[in]  Global                      The context of this Extended SAL Variable Services Class call.
-  @param[in]  Variable                    The variable information which is used to keep track of variable usage.
-  @param[in]  Attributes                  The attribute value of the variable.
-  @param[out] KeyIndex                    The output index of corresponding public key in database.
-  @param[out] MonotonicCount              The output value of corresponding Monotonic Count.
-
-  @retval EFI_INVALID_PARAMETER           Invalid parameter.
-  @retval EFI_WRITE_PROTECTED             The variable is write-protected and needs authentication with
-                                          EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS set.
-  @retval EFI_SECURITY_VIOLATION          The variable is with EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS
-                                          set, but the AuthInfo does NOT pass the validation 
-                                          check carried out by the firmware. 
-  @retval EFI_SUCCESS                     The variable is not write-protected, or passed validation successfully.
-
-**/
-EFI_STATUS
-VerifyVariable (
-  IN  VOID                      *Data,
-  IN  UINTN                     DataSize,
-  IN  BOOLEAN                   VirtualMode,
-  IN  ESAL_VARIABLE_GLOBAL      *Global,
-  IN  VARIABLE_POINTER_TRACK    *Variable,
-  IN  UINT32                    Attributes OPTIONAL,
-  OUT UINT32                    *KeyIndex OPTIONAL,
-  OUT UINT64                    *MonotonicCount OPTIONAL
-  );
-
-/**
-  Initializes for authenticated varibale service.
-
-  @retval EFI_SUCCESS           The function successfully executed.
-  @retval EFI_OUT_OF_RESOURCES  Failed to allocate enough memory resources.
-
-**/
-EFI_STATUS
-AutenticatedVariableServiceInitialize (
-  VOID
-  );
-
-/**
-  Initializes for cryptlib service before use, include register algrithm and allocate scratch.
-
-**/
-VOID
-CryptLibraryInitialize (
-  VOID
-  );
-
-/**
-  Process variable with platform key for verification.
-
-  @param[in]  VariableName                The name of Variable to be found.
-  @param[in]  VendorGuid                  Variable vendor GUID.
-  @param[in]  Data                        The data pointer.
-  @param[in]  DataSize                    The size of Data found. If size is less than the
-                                          data, this value contains the required size.
-  @param[in]  VirtualMode                 The current calling mode for this function.
-  @param[in]  Global                      The context of this Extended SAL Variable Services Class call.
-  @param[in]  Variable                    The variable information which is used to keep track of variable usage.
-  @param[in]  Attributes                  The attribute value of the variable.
-  @param[in]  IsPk                        Indicates whether to process pk.
-
-  @retval EFI_INVALID_PARAMETER           Invalid parameter.
-  @retval EFI_SECURITY_VIOLATION          The variable does NOT pass the validation 
-                                          check carried out by the firmware. 
-  @retval EFI_SUCCESS                     The variable passed validation successfully.
-
-**/
-EFI_STATUS
-ProcessVarWithPk (
-  IN  CHAR16                    *VariableName,
-  IN  EFI_GUID                  *VendorGuid,
-  IN  VOID                      *Data,
-  IN  UINTN                     DataSize,
-  IN  BOOLEAN                   VirtualMode,
-  IN  ESAL_VARIABLE_GLOBAL      *Global,
-  IN  VARIABLE_POINTER_TRACK    *Variable,
-  IN  UINT32                    Attributes OPTIONAL,
-  IN  BOOLEAN                   IsPk
-  );
-
-/**
-  Process variable with key exchange key for verification.
-
-  @param[in]  VariableName                The name of Variable to be found.
-  @param[in]  VendorGuid                  The variable vendor GUID.
-  @param[in]  Data                        The data pointer.
-  @param[in]  DataSize                    Size of Data found. If size is less than the
-                                          data, this value contains the required size.
-  @param[in]  VirtualMode                 The current calling mode for this function.
-  @param[in]  Global                      The context of this Extended SAL Variable Services Class call.
-  @param[in]  Variable                    The variable information which is used to keep track of variable usage.
-  @param[in]  Attributes                  The attribute value of the variable.
-
-  @retval EFI_INVALID_PARAMETER           Invalid parameter.
-  @retval EFI_SECURITY_VIOLATION          The variable does NOT pass the validation 
-                                          check carried out by the firmware. 
-  @retval EFI_SUCCESS                     The variable passed validation successfully.
-
-**/
-EFI_STATUS
-ProcessVarWithKek (
-  IN  CHAR16                               *VariableName,
-  IN  EFI_GUID                             *VendorGuid,
-  IN  VOID                                 *Data,
-  IN  UINTN                                DataSize,
-  IN  BOOLEAN                              VirtualMode,
-  IN  ESAL_VARIABLE_GLOBAL                 *Global,
-  IN  VARIABLE_POINTER_TRACK               *Variable,
-  IN  UINT32                               Attributes OPTIONAL
-  );
-
-#endif
diff --git a/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/EsalVariableDxeSal.inf b/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/EsalVariableDxeSal.inf
deleted file mode 100644
index 16caa30dad..0000000000
--- a/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/EsalVariableDxeSal.inf
+++ /dev/null
@@ -1,105 +0,0 @@
-## @file
-#  Provides authenticated variable service for IPF platform
-#
-#  This module installs variable arch protocol and variable write arch protocol to provide
-#  four EFI_RUNTIME_SERVICES: SetVariable, GetVariable, GetNextVariableName and QueryVariableInfo.
-#
-# Copyright (c) 2009 - 2014, Intel Corporation. All rights reserved.<BR>
-# This program and the accompanying materials
-# are licensed and made available under the terms and conditions of the BSD License
-# which accompanies this distribution. The full text of the license may be found at
-# http://opensource.org/licenses/bsd-license.php
-# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
-# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
-#
-##
-
-[Defines]
-  INF_VERSION                    = 0x00010005
-  BASE_NAME                      = EsalVariableDxeSal
-  MODULE_UNI_FILE                = EsalVariableDxeSal.uni
-  FILE_GUID                      = 14610837-4E97-4427-96E0-21D9B2956996
-  MODULE_TYPE                    = DXE_SAL_DRIVER
-  VERSION_STRING                 = 1.0
-
-  ENTRY_POINT                    = VariableServiceInitialize
-
-#
-# The following information is for reference only and not required by the build tools.
-#
-#  VALID_ARCHITECTURES           = IPF
-#
-#  VIRTUAL_ADDRESS_MAP_CALLBACK  =  VariableClassAddressChangeEvent              
-#
-
-[Sources.common]
-  InitVariable.c
-  Reclaim.c
-  Variable.c
-  Variable.h
-  AuthService.c
-  AuthService.h
-
-[Packages]
-  MdePkg/MdePkg.dec
-  MdeModulePkg/MdeModulePkg.dec
-  CryptoPkg/CryptoPkg.dec
-  SecurityPkg/SecurityPkg.dec
-
-[LibraryClasses]
-  MemoryAllocationLib
-  BaseLib
-  SynchronizationLib
-  UefiLib
-  UefiBootServicesTableLib
-  BaseMemoryLib
-  DebugLib
-  UefiRuntimeLib
-  DxeServicesTableLib
-  UefiDriverEntryPoint
-  PcdLib
-  ExtendedSalLib
-  BaseCryptLib
-  HobLib
-
-[Protocols]
-  gEfiFirmwareVolumeBlockProtocolGuid           ## SOMETIMES_CONSUMES
-  gEfiFaultTolerantWriteProtocolGuid            ## SOMETIMES_CONSUMES
-
-[Guids]
-  ## SOMETIMES_CONSUMES   ## Variable:L"PK"
-  ## CONSUMES             ## Variable:L"SetupMode"
-  ## PRODUCES             ## Variable:L"SetupMode"
-  ## CONSUMES             ## Variable:L"SignatureSupport"
-  ## PRODUCES             ## Variable:L"SignatureSupport"
-  gEfiGlobalVariableGuid
-  
-  ## PRODUCES             ## GUID # Variable store header
-  ## CONSUMES             ## GUID # Variable store header
-  ## SOMETIMES_CONSUMES   ## HOB
-  ## SOMETIMES_PRODUCES   ## SystemTable
-  gEfiAuthenticatedVariableGuid
-  
-  gEfiEventVirtualAddressChangeGuid             ## CONSUMES               ## Event
-  gEfiCertRsa2048Sha256Guid                     ## CONSUMES               ## GUID        # Unique ID for the format of the CertType.
-
-  ## SOMETIMES_CONSUMES   ## Variable:L"DB"
-  ## SOMETIMES_CONSUMES   ## Variable:L"DBX"
-  gEfiImageSecurityDatabaseGuid
-
-[Pcd.common]
-  gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize            ## CONSUMES
-  gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableBase            ## SOMETIMES_CONSUMES
-  gEfiMdeModulePkgTokenSpaceGuid.PcdMaxVariableSize                       ## CONSUMES
-  gEfiMdeModulePkgTokenSpaceGuid.PcdMaxHardwareErrorVariableSize          ## CONSUMES
-  gEfiMdeModulePkgTokenSpaceGuid.PcdVariableStoreSize                     ## CONSUMES
-  gEfiMdeModulePkgTokenSpaceGuid.PcdHwErrStorageSize                      ## CONSUMES
-  
-[FeaturePcd.common]
-  gEfiMdeModulePkgTokenSpaceGuid.PcdVariableCollectStatistics             ## CONSUMES    # statistic the information of variable.
-
-[Depex]
-  gEfiExtendedSalFvBlockServicesProtocolGuid AND gEfiFaultTolerantWriteProtocolGuid  
-
-[UserExtensions.TianoCore."ExtraFiles"]
-  EsalVariableDxeSalExtra.uni
\ No newline at end of file
diff --git a/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/InitVariable.c b/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/InitVariable.c
deleted file mode 100644
index 0f1d645622..0000000000
--- a/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/InitVariable.c
+++ /dev/null
@@ -1,247 +0,0 @@
-/** @file
-  Entrypoint of Extended SAL variable service module.
-
-Copyright (c) 2009 - 2011, Intel Corporation. All rights reserved.<BR>
-This program and the accompanying materials 
-are licensed and made available under the terms and conditions of the BSD License 
-which accompanies this distribution.  The full text of the license may be found at 
-http://opensource.org/licenses/bsd-license.php
-
-THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, 
-WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
-
-**/
-
-#include "Variable.h"
-#include "AuthService.h"
-
-//
-// Don't use module globals after the SetVirtualAddress map is signaled
-//
-EFI_EVENT mEfiVirtualNotifyEvent;
-
-/**
-  Common entry for Extended SAL Variable Services Class.
-
-  This is the common entry of all functions of Extended SAL Variable Services Class.
-
-  @param[in]  FunctionId        The Function ID of member function in Extended SAL Variable Services Class.
-  @param[in]  Arg2              The 2nd parameter for SAL procedure call.
-  @param[in]  Arg3              The 3rd parameter for SAL procedure call.
-  @param[in]  Arg4              The 4th parameter for SAL procedure call.
-  @param[in]  Arg5              The 5th parameter for SAL procedure call.
-  @param[in]  Arg6              The 6th parameter for SAL procedure call.
-  @param[in]  Arg7              The 7th parameter for SAL procedure call.
-  @param[in]  Arg8              The 8th parameter for SAL procedure call.
-  @param[in]  VirtualMode       The current calling mode for this function.
-  @param[in]  Global            The context of this Extended SAL Variable Services Class call.
-
-  @return                       The register of SAL.
-
-**/
-SAL_RETURN_REGS
-EFIAPI
-EsalVariableCommonEntry (
-  IN  UINT64                                      FunctionId,
-  IN  UINT64                                      Arg2,
-  IN  UINT64                                      Arg3,
-  IN  UINT64                                      Arg4,
-  IN  UINT64                                      Arg5,
-  IN  UINT64                                      Arg6,
-  IN  UINT64                                      Arg7,
-  IN  UINT64                                      Arg8,
-  IN  BOOLEAN                                     VirtualMode,
-  IN  ESAL_VARIABLE_GLOBAL                        *Global
-  )
-{
-  SAL_RETURN_REGS ReturnVal;
-  
-  ReturnVal.r9  = 0;
-  ReturnVal.r10 = 0;
-  ReturnVal.r11 = 0;
-
-  switch (FunctionId) {
-  case EsalGetVariableFunctionId:
-    ReturnVal.Status = EsalGetVariable (
-                         (CHAR16 *) Arg2,
-                         (EFI_GUID *) Arg3,
-                         (UINT32 *) Arg4,
-                         (UINTN *) Arg5,
-                         (VOID *) Arg6,
-                         VirtualMode,
-                         Global
-                         );
-    return ReturnVal;
-
-  case EsalGetNextVariableNameFunctionId:
-    ReturnVal.Status = EsalGetNextVariableName (
-                         (UINTN *) Arg2,
-                         (CHAR16 *) Arg3,
-                         (EFI_GUID *) Arg4,
-                         VirtualMode,
-                         Global
-                         );
-    return ReturnVal;
-
-  case EsalSetVariableFunctionId:
-    ReturnVal.Status = EsalSetVariable (
-                         (CHAR16 *) Arg2,
-                         (EFI_GUID *) Arg3,
-                         (UINT32) Arg4,
-                         (UINTN) Arg5,
-                         (VOID *) Arg6,
-                         VirtualMode,
-                         Global
-                         );
-    return ReturnVal;
-
-  case EsalQueryVariableInfoFunctionId:
-    ReturnVal.Status = EsalQueryVariableInfo (
-                         (UINT32) Arg2,
-                         (UINT64 *) Arg3,
-                         (UINT64 *) Arg4,
-                         (UINT64 *) Arg5,
-                         VirtualMode,
-                         Global
-                         );
-    return ReturnVal;
-
-  default:
-    ReturnVal.Status = EFI_SAL_INVALID_ARGUMENT;
-    return ReturnVal;
-  }
-}
-
-/**
-  Notification function of EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE.
-
-  This is a notification function registered on EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE event.
-  It convers pointer to new virtual address.
-
-  @param[in]  Event        The event whose notification function is being invoked.
-  @param[in]  Context      The pointer to the notification function's context.
-
-**/
-VOID
-EFIAPI
-VariableClassAddressChangeEvent (
-  IN EFI_EVENT        Event,
-  IN VOID             *Context
-  )
-{
-  UINTN Index;
-
-  CopyMem (
-    &mVariableModuleGlobal->VariableGlobal[Virtual],
-    &mVariableModuleGlobal->VariableGlobal[Physical],
-    sizeof (VARIABLE_GLOBAL)
-    );
-
-  EfiConvertPointer (
-    0x0,
-    (VOID **) &mVariableModuleGlobal->VariableGlobal[Virtual].NonVolatileVariableBase
-    );
-  EfiConvertPointer (
-    0x0,
-    (VOID **) &mVariableModuleGlobal->VariableGlobal[Virtual].VolatileVariableBase
-    );
-
-  mVariableModuleGlobal->PlatformLangCodes[Virtual] = mVariableModuleGlobal->PlatformLangCodes[Physical];
-  EfiConvertPointer (0x0, (VOID **) &mVariableModuleGlobal->PlatformLangCodes[Virtual]);
-
-  mVariableModuleGlobal->LangCodes[Virtual] = mVariableModuleGlobal->LangCodes[Physical];
-  EfiConvertPointer (0x0, (VOID **) &mVariableModuleGlobal->LangCodes[Virtual]);
-
-  mVariableModuleGlobal->PlatformLang[Virtual] = mVariableModuleGlobal->PlatformLang[Physical];
-  EfiConvertPointer (0x0, (VOID **) &mVariableModuleGlobal->PlatformLang[Virtual]);
-
-  CopyMem (
-    mVariableModuleGlobal->VariableName[Virtual],
-    mVariableModuleGlobal->VariableName[Physical],
-    sizeof (mVariableModuleGlobal->VariableName[Physical])
-    );
-  for (Index = 0; Index < NUM_VAR_NAME; Index++) {
-    EfiConvertPointer (0x0, (VOID **) &mVariableModuleGlobal->VariableName[Virtual][Index]);
-  }
-
-  mVariableModuleGlobal->GlobalVariableGuid[Virtual] = &gEfiGlobalVariableGuid;
-  EfiConvertPointer (0x0, (VOID **) &mVariableModuleGlobal->GlobalVariableGuid[Virtual]);
-
-  mVariableModuleGlobal->AuthenticatedVariableGuid[Virtual] = &gEfiAuthenticatedVariableGuid;
-  EfiConvertPointer (0x0, (VOID **) &mVariableModuleGlobal->AuthenticatedVariableGuid[Virtual]);
-
-  mVariableModuleGlobal->CertRsa2048Sha256Guid[Virtual] = &gEfiCertRsa2048Sha256Guid;
-  EfiConvertPointer (0x0, (VOID **) &mVariableModuleGlobal->CertRsa2048Sha256Guid[Virtual]);
-
-  mVariableModuleGlobal->ImageSecurityDatabaseGuid[Virtual] = &gEfiImageSecurityDatabaseGuid;
-  EfiConvertPointer (0x0, (VOID **) &mVariableModuleGlobal->ImageSecurityDatabaseGuid[Virtual]);
-
-  mVariableModuleGlobal->HashContext[Virtual] = mVariableModuleGlobal->HashContext[Physical];
-  EfiConvertPointer (0x0, (VOID **) &mVariableModuleGlobal->HashContext[Virtual]);
-}
-
-/**
-  Entry point of Extended SAL Variable service module.
-
-  This function is the entry point of Extended SAL Variable service module.
-  It registers all functions of Extended SAL Variable class, initializes
-  variable store for non-volatile and volatile variables, and registers
-  notification function for EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE event.
-
-  @param[in]  ImageHandle   The Image handle of this driver.
-  @param[in]  SystemTable   The pointer of EFI_SYSTEM_TABLE.
-
-  @retval     EFI_SUCCESS   Extended SAL Variable Services Class successfully registered.
-
-**/
-EFI_STATUS
-EFIAPI
-VariableServiceInitialize (
-  IN EFI_HANDLE         ImageHandle,
-  IN EFI_SYSTEM_TABLE   *SystemTable
-  )
-{
-  EFI_STATUS  Status;
-
-  Status = gBS->CreateEventEx (
-                  EVT_NOTIFY_SIGNAL,
-                  TPL_NOTIFY,
-                  VariableClassAddressChangeEvent,
-                  NULL,
-                  &gEfiEventVirtualAddressChangeGuid,
-                  &mEfiVirtualNotifyEvent
-                  );
-
-  ASSERT_EFI_ERROR (Status);
-
-  Status = VariableCommonInitialize (ImageHandle, SystemTable);
-  ASSERT_EFI_ERROR (Status);
-
-  //
-  // Authenticated variable initialize
-  //
-  Status = AutenticatedVariableServiceInitialize ();
-  ASSERT_EFI_ERROR (Status);
-
-  FlushHob2Nv ();
-
-  //
-  // Register All the Functions with Extended SAL Variable Services Class
-  //
-  RegisterEsalClass (
-    EFI_EXTENDED_SAL_VARIABLE_SERVICES_PROTOCOL_GUID_LO,
-    EFI_EXTENDED_SAL_VARIABLE_SERVICES_PROTOCOL_GUID_HI,
-    mVariableModuleGlobal,
-    EsalVariableCommonEntry,
-    EsalGetVariableFunctionId,
-    EsalVariableCommonEntry,
-    EsalGetNextVariableNameFunctionId,
-    EsalVariableCommonEntry,
-    EsalSetVariableFunctionId,
-    EsalVariableCommonEntry,
-    EsalQueryVariableInfoFunctionId,
-    NULL
-    );
-
-  return EFI_SUCCESS;
-}
diff --git a/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/Reclaim.c b/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/Reclaim.c
deleted file mode 100644
index 1cbf9ac877..0000000000
--- a/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/Reclaim.c
+++ /dev/null
@@ -1,262 +0,0 @@
-/** @file
-  Handles non-volatile variable store garbage collection, using FTW
-  (Fault Tolerant Write) protocol.
-
-Copyright (c) 2006 - 2011, Intel Corporation. All rights reserved.<BR>
-This program and the accompanying materials 
-are licensed and made available under the terms and conditions of the BSD License 
-which accompanies this distribution.  The full text of the license may be found at 
-http://opensource.org/licenses/bsd-license.php
-
-THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, 
-WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
-
-**/
-
-#include "Variable.h"
-
-/**
-  Gets firmware volume block handle by given address.
-
-  This function gets firmware volume block handle whose
-  address range contains the parameter Address.
-
-  @param[in]  Address    Address which should be contained
-                         by returned FVB handle.
-  @param[out] FvbHandle  Pointer to FVB handle for output.
-
-  @retval EFI_SUCCESS    FVB handle successfully returned.
-  @retval EFI_NOT_FOUND  Failed to find FVB handle by address.
-
-**/
-EFI_STATUS
-GetFvbHandleByAddress (
-  IN  EFI_PHYSICAL_ADDRESS   Address,
-  OUT EFI_HANDLE             *FvbHandle
-  )
-{
-  EFI_STATUS                          Status;
-  EFI_HANDLE                          *HandleBuffer;
-  UINTN                               HandleCount;
-  UINTN                               Index;
-  EFI_PHYSICAL_ADDRESS                FvbBaseAddress;
-  EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL  *Fvb;
-  EFI_FIRMWARE_VOLUME_HEADER          *FwVolHeader;
-
-  *FvbHandle = NULL;
-  //
-  // Locate all handles with Firmware Volume Block protocol
-  //
-  Status = gBS->LocateHandleBuffer (
-                  ByProtocol,
-                  &gEfiFirmwareVolumeBlockProtocolGuid,
-                  NULL,
-                  &HandleCount,
-                  &HandleBuffer
-                  );
-  if (EFI_ERROR (Status)) {
-    return EFI_NOT_FOUND;
-  }
-  //
-  // Traverse all the handles, searching for the one containing parameter Address
-  //
-  for (Index = 0; Index < HandleCount; Index += 1) {
-    Status = gBS->HandleProtocol (
-                    HandleBuffer[Index],
-                    &gEfiFirmwareVolumeBlockProtocolGuid,
-                    (VOID **) &Fvb
-                    );
-    if (EFI_ERROR (Status)) {
-      Status = EFI_NOT_FOUND;
-      break;
-    }
-    //
-    // Checks if the address range of this handle contains parameter Address
-    //
-    Status = Fvb->GetPhysicalAddress (Fvb, &FvbBaseAddress);
-    if (EFI_ERROR (Status)) {
-      continue;
-    }
-
-    FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) ((UINTN) FvbBaseAddress);
-    if ((Address >= FvbBaseAddress) && (Address <= (FvbBaseAddress + FwVolHeader->FvLength))) {
-      *FvbHandle  = HandleBuffer[Index];
-      Status      = EFI_SUCCESS;
-      break;
-    }
-  }
-
-  FreePool (HandleBuffer);
-  return Status;
-}
-
-/**
-  Gets LBA of block and offset by given address.
-
-  This function gets the Logical Block Address (LBA) of firmware
-  volume block containing the given address, and the offset of
-  address on the block.
-
-  @param[in]  Address    Address which should be contained
-                         by returned FVB handle.
-  @param[out] Lba        The pointer to LBA for output.
-  @param[out] Offset     The pointer to offset for output.
-
-  @retval EFI_SUCCESS    LBA and offset successfully returned.
-  @retval EFI_NOT_FOUND  Failed to find FVB handle by address.
-  @retval EFI_ABORTED    Failed to find valid LBA and offset.
-
-**/
-EFI_STATUS
-GetLbaAndOffsetByAddress (
-  IN  EFI_PHYSICAL_ADDRESS   Address,
-  OUT EFI_LBA                *Lba,
-  OUT UINTN                  *Offset
-  )
-{
-  EFI_STATUS                          Status;
-  EFI_HANDLE                          FvbHandle;
-  EFI_PHYSICAL_ADDRESS                FvbBaseAddress;
-  EFI_FIRMWARE_VOLUME_BLOCK_PROTOCOL  *Fvb;
-  EFI_FIRMWARE_VOLUME_HEADER          *FwVolHeader;
-  EFI_FV_BLOCK_MAP_ENTRY              *FvbMapEntry;
-  UINT32                              LbaIndex;
-
-  *Lba    = (EFI_LBA) (-1);
-  *Offset = 0;
-
-  //
-  // Gets firmware volume block handle by given address.
-  //
-  Status = GetFvbHandleByAddress (Address, &FvbHandle);
-  if (EFI_ERROR (Status)) {
-    return Status;
-  }
-
-  Status = gBS->HandleProtocol (
-                  FvbHandle,
-                  &gEfiFirmwareVolumeBlockProtocolGuid,
-                  (VOID **) &Fvb
-                  );
-  if (EFI_ERROR (Status)) {
-    return Status;
-  }
-  //
-  // Get the Base Address of FV
-  //
-  Status = Fvb->GetPhysicalAddress (Fvb, &FvbBaseAddress);
-  if (EFI_ERROR (Status)) {
-    return Status;
-  }
-
-  FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) ((UINTN) FvbBaseAddress);
-
-  //
-  // Get the (LBA, Offset) of Address
-  //
-  if ((Address >= FvbBaseAddress) && (Address <= (FvbBaseAddress + FwVolHeader->FvLength))) {
-    if ((FwVolHeader->FvLength) > (FwVolHeader->HeaderLength)) {
-      //
-      // BUGBUG: Assume one FV has one type of BlockLength
-      //
-      FvbMapEntry = &FwVolHeader->BlockMap[0];
-      for (LbaIndex = 1; LbaIndex <= FvbMapEntry->NumBlocks; LbaIndex += 1) {
-        if (Address < (FvbBaseAddress + FvbMapEntry->Length * LbaIndex)) {
-          //
-          // Found the (Lba, Offset)
-          //
-          *Lba    = LbaIndex - 1;
-          *Offset = (UINTN) (Address - (FvbBaseAddress + FvbMapEntry->Length * (LbaIndex - 1)));
-          return EFI_SUCCESS;
-        }
-      }
-    }
-  }
-
-  return EFI_ABORTED;
-}
-
-/**
-  Writes a buffer to variable storage space.
-
-  This function writes a buffer to variable storage space into firmware
-  volume block device. The destination is specified by parameter
-  VariableBase. Fault Tolerant Write protocol is used for writing.
-
-  @param[in] VariableBase The base address of the variable to write.
-  @param[in] Buffer       Points to the data buffer.
-  @param[in] BufferSize   The number of bytes of the data Buffer.
-
-  @retval EFI_SUCCESS     The function completed successfully.
-  @retval EFI_NOT_FOUND   Fail to locate Fault Tolerant Write protocol.
-  @retval Other           The function could not complete successfully.
-
-**/
-EFI_STATUS
-FtwVariableSpace (
-  IN EFI_PHYSICAL_ADDRESS   VariableBase,
-  IN UINT8                  *Buffer,
-  IN UINTN                  BufferSize
-  )
-{
-  EFI_STATUS            Status;
-  EFI_HANDLE            FvbHandle;
-  EFI_LBA               VarLba;
-  UINTN                 VarOffset;
-  UINT8                 *FtwBuffer;
-  UINTN                 FtwBufferSize;
-  EFI_FAULT_TOLERANT_WRITE_PROTOCOL  *FtwProtocol;
-
-  //
-  // Locate Fault Tolerant Write protocol
-  //
-  Status = gBS->LocateProtocol (
-                  &gEfiFaultTolerantWriteProtocolGuid,
-                  NULL,
-                  (VOID **) &FtwProtocol
-                  );
-  if (EFI_ERROR (Status)) {
-    return EFI_NOT_FOUND;
-  }
-  //
-  // Gets firmware volume block handle by VariableBase.
-  //
-  Status = GetFvbHandleByAddress (VariableBase, &FvbHandle);
-  if (EFI_ERROR (Status)) {
-    return Status;
-  }
-  //
-  // Gets LBA of block and offset by VariableBase.
-  //
-  Status = GetLbaAndOffsetByAddress (VariableBase, &VarLba, &VarOffset);
-  if (EFI_ERROR (Status)) {
-    return EFI_ABORTED;
-  }
-  //
-  // Prepare for the variable data
-  //
-  FtwBufferSize = ((VARIABLE_STORE_HEADER *) ((UINTN) VariableBase))->Size;
-  FtwBuffer     = AllocatePool (FtwBufferSize);
-  if (FtwBuffer == NULL) {
-    return EFI_OUT_OF_RESOURCES;
-  }
-
-  SetMem (FtwBuffer, FtwBufferSize, (UINT8) 0xff);
-  CopyMem (FtwBuffer, Buffer, BufferSize);
-
-  //
-  // FTW write record
-  //
-  Status = FtwProtocol->Write (
-                          FtwProtocol,
-                          VarLba,         // LBA
-                          VarOffset,      // Offset
-                          FtwBufferSize,  // NumBytes,
-                          NULL,
-                          FvbHandle,
-                          FtwBuffer
-                          );
-
-  FreePool (FtwBuffer);
-  return Status;
-}
diff --git a/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/Variable.c b/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/Variable.c
deleted file mode 100644
index dfa85973f4..0000000000
--- a/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/Variable.c
+++ /dev/null
@@ -1,3257 +0,0 @@
-/** @file
-  The implementation of Extended SAL variable services.
-
-Copyright (c) 2009 - 2016, Intel Corporation. All rights reserved.<BR>
-This program and the accompanying materials 
-are licensed and made available under the terms and conditions of the BSD License 
-which accompanies this distribution.  The full text of the license may be found at 
-http://opensource.org/licenses/bsd-license.php
-
-THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, 
-WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
-
-**/
-
-#include "Variable.h"
-#include "AuthService.h"
-
-//
-// Don't use module globals after the SetVirtualAddress map is signaled
-//
-ESAL_VARIABLE_GLOBAL  *mVariableModuleGlobal;
-CHAR16 *mVariableName[NUM_VAR_NAME] = {
-  L"PlatformLangCodes",
-  L"LangCodes",
-  L"PlatformLang",
-  L"Lang",
-  L"HwErrRec",
-  AUTHVAR_KEYDB_NAME,
-  EFI_SETUP_MODE_NAME,
-  EFI_PLATFORM_KEY_NAME,
-  EFI_KEY_EXCHANGE_KEY_NAME
-};
-
-GLOBAL_REMOVE_IF_UNREFERENCED VARIABLE_INFO_ENTRY *gVariableInfo = NULL;
-
-//
-// The current Hii implementation accesses this variable a larg # of times on every boot.
-// Other common variables are only accessed a single time. This is why this cache algorithm
-// only targets a single variable. Probably to get an performance improvement out of
-// a Cache you would need a cache that improves the search performance for a variable.
-//
-VARIABLE_CACHE_ENTRY mVariableCache[] = {
-  {
-    &gEfiGlobalVariableGuid,
-    L"Lang",
-    0x00000000,
-    0x00,
-    NULL
-  },
-  {
-    &gEfiGlobalVariableGuid,
-    L"PlatformLang",
-    0x00000000,
-    0x00,
-    NULL
-  }
-};
-
-/**
-  Acquires lock only at boot time. Simply returns at runtime.
-
-  This is a temperary function which will be removed when
-  EfiAcquireLock() in UefiLib can handle the call in UEFI
-  Runtimer driver in RT phase.
-  It calls EfiAcquireLock() at boot time, and simply returns
-  at runtime.
-
-  @param[in]  Lock     A pointer to the lock to acquire.
-
-**/
-VOID
-AcquireLockOnlyAtBootTime (
-  IN EFI_LOCK  *Lock
-  )
-{
-  if (!EfiAtRuntime ()) {
-    EfiAcquireLock (Lock);
-  }
-}
-
-/**
-  Releases lock only at boot time. Simply returns at runtime.
-
-  This is a temperary function which will be removed when
-  EfiReleaseLock() in UefiLib can handle the call in UEFI
-  Runtimer driver in RT phase.
-  It calls EfiReleaseLock() at boot time, and simply returns
-  at runtime
-
-  @param[in]  Lock    A pointer to the lock to release.
-
-**/
-VOID
-ReleaseLockOnlyAtBootTime (
-  IN EFI_LOCK  *Lock
-  )
-{
-  if (!EfiAtRuntime ()) {
-    EfiReleaseLock (Lock);
-  }
-}
-
-/**
-  Reads/Writes variable storage, volatile or non-volatile.
-
-  This function reads or writes volatile or non-volatile variable stroage.
-  For volatile storage, it performs memory copy.
-  For non-volatile storage, it accesses data on firmware storage. Data
-  area to access can span multiple firmware blocks.
-
-  @param[in]      Write           TRUE  - Write variable store.
-                                  FALSE - Read variable store.
-  @param[in]      Global          Pointer to VARAIBLE_GLOBAL structure.
-  @param[in]      Volatile        TRUE  - Variable is volatile.
-                                  FALSE - Variable is non-volatile.
-  @param[in]      Instance        Instance of FV Block services.
-  @param[in]      StartAddress    Start address of data to access.
-  @param[in]      DataSize        Size of data to access.
-  @param[in, out] Buffer          For write, pointer to the buffer from which data is written.
-                                  For read, pointer to the buffer to hold the data read.
-
-  @retval EFI_SUCCESS            Variable store successfully accessed.
-  @retval EFI_INVALID_PARAMETER  Data area to access exceeds valid variable storage.
-
-**/
-EFI_STATUS
-AccessVariableStore (
-  IN     BOOLEAN                 Write,
-  IN     VARIABLE_GLOBAL         *Global,
-  IN     BOOLEAN                 Volatile,
-  IN     UINTN                   Instance,
-  IN     EFI_PHYSICAL_ADDRESS    StartAddress,
-  IN     UINT32                  DataSize,
-  IN OUT VOID                    *Buffer
-  )
-{
-  EFI_FV_BLOCK_MAP_ENTRY      *PtrBlockMapEntry;
-  UINTN                       BlockIndex;
-  UINTN                       LinearOffset;
-  UINTN                       CurrWriteSize;
-  UINTN                       CurrWritePtr;
-  UINT8                       *CurrBuffer;
-  EFI_LBA                     LbaNumber;
-  UINTN                       Size;
-  EFI_FIRMWARE_VOLUME_HEADER  *FwVolHeader;
-  VARIABLE_STORE_HEADER       *VolatileBase;
-  EFI_PHYSICAL_ADDRESS        FvVolHdr;
-  EFI_STATUS                  Status;
-  VARIABLE_STORE_HEADER       *VariableStoreHeader;
-
-  FvVolHdr = 0;
-  FwVolHeader = NULL;
-
-  if (Volatile) {
-    //
-    // If data is volatile, simply calculate the data pointer and copy memory.
-    // Data pointer should point to the actual address where data is to be
-    // accessed.
-    //
-    VolatileBase = (VARIABLE_STORE_HEADER *) ((UINTN) Global->VolatileVariableBase);
-
-    if ((StartAddress + DataSize) > ((UINTN) ((UINT8 *) VolatileBase + VolatileBase->Size))) {
-      return EFI_INVALID_PARAMETER;
-    }
-    
-    //
-    // For volatile variable, a simple memory copy is enough.
-    //
-    if (Write) {
-      CopyMem ((VOID *) StartAddress, Buffer, DataSize);
-    } else {
-      CopyMem (Buffer, (VOID *) StartAddress, DataSize);
-    }
-
-    return EFI_SUCCESS;
-  }
-
-  //
-  // If data is non-volatile, calculate firmware volume header and data pointer.
-  //
-  Status = (EFI_STATUS) EsalCall (
-                          EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_LO,
-                          EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_HI,
-                          GetPhysicalAddressFunctionId, 
-                          Instance, 
-                          (UINT64) &FvVolHdr, 
-                          0, 
-                          0, 
-                          0, 
-                          0, 
-                          0
-                          ).Status;
-  ASSERT_EFI_ERROR (Status);
-
-  FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) ((UINTN) FvVolHdr);
-  ASSERT (FwVolHeader != NULL);
-  VariableStoreHeader = (VARIABLE_STORE_HEADER *)(FwVolHeader + 1);
-
-  if ((StartAddress + DataSize) > ((EFI_PHYSICAL_ADDRESS) (UINTN) ((CHAR8 *)VariableStoreHeader + VariableStoreHeader->Size))) {
-    return EFI_INVALID_PARAMETER;
-  }
-  
-  LinearOffset  = (UINTN) FwVolHeader;
-  CurrWritePtr  = StartAddress;
-  CurrWriteSize = DataSize;
-  CurrBuffer    = Buffer;
-  LbaNumber     = 0;
-
-  if (CurrWritePtr < LinearOffset) {
-    return EFI_INVALID_PARAMETER;
-  }
-
-  //
-  // Traverse data blocks of this firmware storage to find the one where CurrWritePtr locates
-  //
-  for (PtrBlockMapEntry = FwVolHeader->BlockMap; PtrBlockMapEntry->NumBlocks != 0; PtrBlockMapEntry++) {
-    for (BlockIndex = 0; BlockIndex < PtrBlockMapEntry->NumBlocks; BlockIndex++) {
-      if ((CurrWritePtr >= LinearOffset) && (CurrWritePtr < LinearOffset + PtrBlockMapEntry->Length)) {
-        //
-        // Check to see if the data area to access spans multiple blocks.
-        //
-        if ((CurrWritePtr + CurrWriteSize) <= (LinearOffset + PtrBlockMapEntry->Length)) {
-          //
-          // If data area to access is contained in one block, just access and return.
-          //
-          if (Write) {
-            Status = (EFI_STATUS) EsalCall (
-                                    EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_LO,
-                                    EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_HI,
-                                    WriteFunctionId, 
-                                    Instance, 
-                                    LbaNumber, 
-                                    (CurrWritePtr - LinearOffset), 
-                                    (UINT64) &CurrWriteSize, 
-                                    (UINT64) CurrBuffer, 
-                                    0, 
-                                    0
-                                    ).Status;
-          } else {
-            Status = (EFI_STATUS) EsalCall (
-                                    EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_LO,
-                                    EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_HI,
-                                    ReadFunctionId, 
-                                    Instance, 
-                                    LbaNumber, 
-                                    (CurrWritePtr - LinearOffset), 
-                                    (UINT64) &CurrWriteSize, 
-                                    (UINT64) CurrBuffer, 
-                                    0, 
-                                    0
-                                    ).Status;
-          }
-          return Status;
-        } else {
-          //
-          // If data area to access spans multiple blocks, access this one and adjust for the next one.
-          //
-          Size = (UINT32) (LinearOffset + PtrBlockMapEntry->Length - CurrWritePtr);
-          if (Write) {
-            Status = (EFI_STATUS) EsalCall (
-                                    EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_LO,
-                                    EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_HI,
-                                    WriteFunctionId, 
-                                    Instance, 
-                                    LbaNumber, 
-                                    (CurrWritePtr - LinearOffset), 
-                                    (UINT64) &Size, 
-                                    (UINT64) CurrBuffer, 
-                                    0, 
-                                    0
-                                    ).Status;
-          } else {
-            Status = (EFI_STATUS) EsalCall (
-                                    EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_LO,
-                                    EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_HI,
-                                    ReadFunctionId, 
-                                    Instance, 
-                                    LbaNumber, 
-                                    (CurrWritePtr - LinearOffset), 
-                                    (UINT64) &Size, 
-                                    (UINT64) CurrBuffer, 
-                                    0, 
-                                    0
-                                    ).Status;
-          }
-          if (EFI_ERROR (Status)) {
-            return Status;
-          }
-          //
-          // Adjust for the remaining data.
-          //
-          CurrWritePtr  = LinearOffset + PtrBlockMapEntry->Length;
-          CurrBuffer    = CurrBuffer + Size;
-          CurrWriteSize = CurrWriteSize - Size;
-        }
-      }
-
-      LinearOffset += PtrBlockMapEntry->Length;
-      LbaNumber++;
-    }
-  }
-
-  return EFI_SUCCESS;
-}
-
-/**
-  Retrieves header of volatile or non-volatile variable stroage.
-
-  @param[in]  VarStoreAddress    Start address of variable storage.
-  @param[in]  Volatile           TRUE  - Variable storage is volatile.
-                                 FALSE - Variable storage is non-volatile.
-  @param[in]  Global             Pointer to VARAIBLE_GLOBAL structure.
-  @param[in]  Instance           Instance of FV Block services.
-  @param[out] VarStoreHeader     Pointer to VARIABLE_STORE_HEADER for output.
-
-**/
-VOID
-GetVarStoreHeader (
-  IN  EFI_PHYSICAL_ADDRESS   VarStoreAddress,
-  IN  BOOLEAN                Volatile,
-  IN  VARIABLE_GLOBAL        *Global,
-  IN  UINTN                  Instance,
-  OUT VARIABLE_STORE_HEADER  *VarStoreHeader
-  )
-{
-  EFI_STATUS            Status;
-
-  Status = AccessVariableStore (
-             FALSE,
-             Global,
-             Volatile,
-             Instance,
-             VarStoreAddress,
-             sizeof (VARIABLE_STORE_HEADER),
-             VarStoreHeader    
-             );
-  ASSERT_EFI_ERROR (Status);
-}
-
-/**
-  Checks variable header.
-
-  This function checks if variable header is valid or not.
-
-  @param[in]  VariableAddress    Start address of variable header.
-  @param[in]  Volatile           TRUE  - Variable is volatile.
-                                 FALSE - Variable is non-volatile.
-  @param[in]  Global             Pointer to VARAIBLE_GLOBAL structure.
-  @param[in]  Instance           Instance of FV Block services.
-  @param[out] VariableHeader     Pointer to AUTHENTICATED_VARIABLE_HEADER for output.
-
-  @retval TRUE                   Variable header is valid.
-  @retval FALSE                  Variable header is not valid.
-
-**/
-BOOLEAN
-IsValidVariableHeader (
-  IN  EFI_PHYSICAL_ADDRESS              VariableAddress,
-  IN  BOOLEAN                           Volatile,
-  IN  VARIABLE_GLOBAL                   *Global,
-  IN  UINTN                             Instance,
-  OUT AUTHENTICATED_VARIABLE_HEADER     *VariableHeader  OPTIONAL
-  )
-{
-  EFI_STATUS                            Status;
-  AUTHENTICATED_VARIABLE_HEADER         LocalVariableHeader;
-
-  Status = AccessVariableStore (
-             FALSE,
-             Global,
-             Volatile,
-             Instance,
-             VariableAddress,
-             sizeof (AUTHENTICATED_VARIABLE_HEADER),
-             &LocalVariableHeader    
-             );
-
-  if (EFI_ERROR (Status) || LocalVariableHeader.StartId != VARIABLE_DATA) {
-    return FALSE;
-  }
-
-  if (VariableHeader != NULL) {
-    CopyMem (VariableHeader, &LocalVariableHeader, sizeof (AUTHENTICATED_VARIABLE_HEADER));
-  }
-
-  return TRUE;
-}
-
-/**
-  Gets status of variable store.
-
-  This function gets the current status of variable store.
-
-  @param[in] VarStoreHeader  Pointer to header of variable store.
-
-  @retval EfiRaw          Variable store status is raw.
-  @retval EfiValid        Variable store status is valid.
-  @retval EfiInvalid      Variable store status is invalid.
-
-**/
-VARIABLE_STORE_STATUS
-GetVariableStoreStatus (
-  IN VARIABLE_STORE_HEADER *VarStoreHeader
-  )
-{
-
-  if (CompareGuid (&VarStoreHeader->Signature, &gEfiAuthenticatedVariableGuid) &&
-      VarStoreHeader->Format == VARIABLE_STORE_FORMATTED &&
-      VarStoreHeader->State == VARIABLE_STORE_HEALTHY
-      ) {
-
-    return EfiValid;
-  } else if (((UINT32 *)(&VarStoreHeader->Signature))[0] == 0xffffffff &&
-             ((UINT32 *)(&VarStoreHeader->Signature))[1] == 0xffffffff &&
-             ((UINT32 *)(&VarStoreHeader->Signature))[2] == 0xffffffff &&
-             ((UINT32 *)(&VarStoreHeader->Signature))[3] == 0xffffffff &&
-             VarStoreHeader->Size == 0xffffffff &&
-             VarStoreHeader->Format == 0xff &&
-             VarStoreHeader->State == 0xff
-          ) {
-
-    return EfiRaw;
-  } else {
-    return EfiInvalid;
-  }
-}
-
-/**
-  Gets the size of variable name.
-
-  This function gets the size of variable name.
-  The variable is specified by its variable header.
-  If variable header contains raw data, just return 0.
-
-  @param[in] Variable  Pointer to the variable header.
-
-  @return              Size of variable name in bytes.
-
-**/
-UINTN
-NameSizeOfVariable (
-  IN  AUTHENTICATED_VARIABLE_HEADER     *Variable
-  )
-{
-  if (Variable->State    == (UINT8) (-1) ||
-      Variable->DataSize == (UINT32) -1 ||
-      Variable->NameSize == (UINT32) -1 ||
-      Variable->Attributes == (UINT32) -1) {
-    return 0;
-  }
-  return (UINTN) Variable->NameSize;
-}
-
-/**
-  Gets the size of variable data area.
-
-  This function gets the size of variable data area.
-  The variable is specified by its variable header.
-  If variable header contains raw data, just return 0.
-
-  @param[in]  Variable  Pointer to the variable header.
-
-  @return               Size of variable data area in bytes.
-
-**/
-UINTN
-DataSizeOfVariable (
-  IN  AUTHENTICATED_VARIABLE_HEADER     *Variable
-  )
-{
-  if (Variable->State    == (UINT8)  -1 ||
-      Variable->DataSize == (UINT32) -1 ||
-      Variable->NameSize == (UINT32) -1 ||
-      Variable->Attributes == (UINT32) -1) {
-    return 0;
-  }
-  return (UINTN) Variable->DataSize;
-}
-
-/**
-  Gets the pointer to variable name.
-
-  This function gets the pointer to variable name.
-  The variable is specified by its variable header.
-
-  @param[in]  VariableAddress    Start address of variable header.
-  @param[in]  Volatile           TRUE  - Variable is volatile.
-                                 FALSE - Variable is non-volatile.
-  @param[in]  Global             Pointer to VARAIBLE_GLOBAL structure.
-  @param[in]  Instance           Instance of FV Block services.
-  @param[out] VariableName       Buffer to hold variable name for output.
-
-**/
-VOID
-GetVariableNamePtr (
-  IN  EFI_PHYSICAL_ADDRESS   VariableAddress,
-  IN  BOOLEAN                Volatile,
-  IN  VARIABLE_GLOBAL        *Global,
-  IN  UINTN                  Instance,
-  OUT CHAR16                 *VariableName
-  )
-{
-  EFI_STATUS                        Status;
-  EFI_PHYSICAL_ADDRESS              Address;
-  AUTHENTICATED_VARIABLE_HEADER     VariableHeader;
-  BOOLEAN                           IsValid;
-
-  IsValid = IsValidVariableHeader (VariableAddress, Volatile, Global, Instance, &VariableHeader);
-  ASSERT (IsValid);
-
-  //
-  // Name area follows variable header.
-  //
-  Address = VariableAddress + sizeof (AUTHENTICATED_VARIABLE_HEADER);
-
-  Status = AccessVariableStore (
-             FALSE,
-             Global,
-             Volatile,
-             Instance,
-             Address,
-             VariableHeader.NameSize,
-             VariableName    
-             );
-  ASSERT_EFI_ERROR (Status);
-}
-
-/**
-  Gets the pointer to variable data area.
-
-  This function gets the pointer to variable data area.
-  The variable is specified by its variable header.
-
-  @param[in]  VariableAddress    Start address of variable header.
-  @param[in]  Volatile           TRUE  - Variable is volatile.
-                                 FALSE - Variable is non-volatile.
-  @param[in]  Global             Pointer to VARAIBLE_GLOBAL structure.
-  @param[in]  Instance           Instance of FV Block services.
-  @param[out] VariableData       Buffer to hold variable data for output.
-
-**/
-VOID
-GetVariableDataPtr (
-  IN  EFI_PHYSICAL_ADDRESS   VariableAddress,
-  IN  BOOLEAN                Volatile,
-  IN  VARIABLE_GLOBAL        *Global,
-  IN  UINTN                  Instance,
-  OUT CHAR16                 *VariableData
-  )
-{
-  EFI_STATUS                        Status;
-  EFI_PHYSICAL_ADDRESS              Address;
-  AUTHENTICATED_VARIABLE_HEADER     VariableHeader;
-  BOOLEAN                           IsValid;
-
-  IsValid = IsValidVariableHeader (VariableAddress, Volatile, Global, Instance, &VariableHeader);
-  ASSERT (IsValid);
-
-  //
-  // Data area follows variable name.
-  // Be careful about pad size for alignment
-  //
-  Address =  VariableAddress + sizeof (AUTHENTICATED_VARIABLE_HEADER);
-  Address += NameSizeOfVariable (&VariableHeader);
-  Address += GET_PAD_SIZE (NameSizeOfVariable (&VariableHeader));
-
-  Status = AccessVariableStore (
-             FALSE,
-             Global,
-             Volatile,
-             Instance,
-             Address,
-             VariableHeader.DataSize,
-             VariableData    
-             );
-  ASSERT_EFI_ERROR (Status);
-}
-
-
-/**
-  Gets the pointer to the next variable header.
-
-  This function gets the pointer to the next variable header.
-  The variable is specified by its variable header.
-
-  @param[in]  VariableAddress    Start address of variable header.
-  @param[in]  Volatile           TRUE  - Variable is volatile.
-                                 FALSE - Variable is non-volatile.
-  @param[in]  Global             Pointer to VARAIBLE_GLOBAL structure.
-  @param[in]  Instance           Instance of FV Block services.
-
-  @return                        Pointer to the next variable header.
-                                 NULL if variable header is invalid.
-
-**/
-EFI_PHYSICAL_ADDRESS
-GetNextVariablePtr (
-  IN  EFI_PHYSICAL_ADDRESS   VariableAddress,
-  IN  BOOLEAN                Volatile,
-  IN  VARIABLE_GLOBAL        *Global,
-  IN  UINTN                  Instance
-  )
-{
-  EFI_PHYSICAL_ADDRESS              Address;
-  AUTHENTICATED_VARIABLE_HEADER     VariableHeader;
-
-  if (!IsValidVariableHeader (VariableAddress, Volatile, Global, Instance, &VariableHeader)) {
-    return 0x0;
-  }
-
-  //
-  // Header of next variable follows data area of this variable
-  //
-  Address =  VariableAddress + sizeof (AUTHENTICATED_VARIABLE_HEADER);
-  Address += NameSizeOfVariable (&VariableHeader);
-  Address += GET_PAD_SIZE (NameSizeOfVariable (&VariableHeader));
-  Address += DataSizeOfVariable (&VariableHeader);
-  Address += GET_PAD_SIZE (DataSizeOfVariable (&VariableHeader));
-
-  //
-  // Be careful about pad size for alignment
-  //
-  return HEADER_ALIGN (Address);
-}
-
-/**
-  Gets the pointer to the first variable header in given variable store area.
-
-  This function gets the pointer to the first variable header in given variable 
-  store area. The variable store area is given by its start address.
-
-  @param[in] VarStoreHeaderAddress  Pointer to the header of variable store area.
-
-  @return                           Pointer to the first variable header.
-
-**/
-EFI_PHYSICAL_ADDRESS
-GetStartPointer (
-  IN EFI_PHYSICAL_ADDRESS  VarStoreHeaderAddress
-  )
-{
-  return HEADER_ALIGN (VarStoreHeaderAddress + sizeof (VARIABLE_STORE_HEADER));
-}
-
-/**
-  Gets the pointer to the end of given variable store area.
-
-  This function gets the pointer to the end of given variable store area.
-  The variable store area is given by its start address.
-
-  @param[in]  VarStoreHeaderAddress  Pointer to the header of variable store area.
-  @param[in]  Volatile               TRUE  - Variable is volatile.
-                                     FALSE - Variable is non-volatile.
-  @param[in]  Global                 Pointer to VARAIBLE_GLOBAL structure.
-  @param[in]  Instance               Instance of FV Block services.
-
-  @return                            Pointer to the end of given variable store area.
-
-**/
-EFI_PHYSICAL_ADDRESS
-GetEndPointer (
-  IN EFI_PHYSICAL_ADDRESS  VarStoreHeaderAddress,
-  IN  BOOLEAN              Volatile,
-  IN  VARIABLE_GLOBAL      *Global,
-  IN  UINTN                Instance
-  )
-{
-  EFI_STATUS            Status;
-  VARIABLE_STORE_HEADER VariableStoreHeader;
-
-  Status = AccessVariableStore (
-             FALSE,
-             Global,
-             Volatile,
-             Instance,
-             VarStoreHeaderAddress,
-             sizeof (VARIABLE_STORE_HEADER),
-             &VariableStoreHeader    
-             );
-
-  ASSERT_EFI_ERROR (Status);
-  return HEADER_ALIGN (VarStoreHeaderAddress + VariableStoreHeader.Size);
-}
-
-/**
-  Updates variable info entry in EFI system table for statistical information.
-
-  Routine used to track statistical information about variable usage. 
-  The data is stored in the EFI system table so it can be accessed later.
-  VariableInfo.efi can dump out the table. Only Boot Services variable 
-  accesses are tracked by this code. The PcdVariableCollectStatistics
-  build flag controls if this feature is enabled. 
-  A read that hits in the cache will have Read and Cache true for 
-  the transaction. Data is allocated by this routine, but never
-  freed.
-
-  @param[in]  VariableName   Name of the Variable to track.
-  @param[in]  VendorGuid     Guid of the Variable to track.
-  @param[in]  Volatile       TRUE if volatile FALSE if non-volatile.
-  @param[in]  Read           TRUE if GetVariable() was called.
-  @param[in]  Write          TRUE if SetVariable() was called.
-  @param[in]  Delete         TRUE if deleted via SetVariable().
-  @param[in]  Cache          TRUE for a cache hit.
-
-**/
-VOID
-UpdateVariableInfo (
-  IN  CHAR16                  *VariableName,
-  IN  EFI_GUID                *VendorGuid,
-  IN  BOOLEAN                 Volatile,
-  IN  BOOLEAN                 Read,
-  IN  BOOLEAN                 Write,
-  IN  BOOLEAN                 Delete,
-  IN  BOOLEAN                 Cache
-  )
-{
-  VARIABLE_INFO_ENTRY   *Entry;
-
-  if (FeaturePcdGet (PcdVariableCollectStatistics)) {
-
-    if (EfiAtRuntime ()) {
-      //
-      // Don't collect statistics at runtime
-      //
-      return;
-    }
-
-    if (gVariableInfo == NULL) {
-      //
-      // on the first call allocate a entry and place a pointer to it in
-      // the EFI System Table
-      //
-      gVariableInfo = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY));
-      ASSERT (gVariableInfo != NULL);
-
-      CopyGuid (&gVariableInfo->VendorGuid, VendorGuid);
-      gVariableInfo->Name = AllocatePool (StrSize (VariableName));
-      ASSERT (gVariableInfo->Name != NULL);
-      StrCpyS (gVariableInfo->Name, StrSize (VariableName) / sizeof (CHAR16), VariableName);
-      gVariableInfo->Volatile = Volatile;
-
-      gBS->InstallConfigurationTable (&gEfiAuthenticatedVariableGuid, gVariableInfo);
-    }
-
-    
-    for (Entry = gVariableInfo; Entry != NULL; Entry = Entry->Next) {
-      if (CompareGuid (VendorGuid, &Entry->VendorGuid)) {
-        if (StrCmp (VariableName, Entry->Name) == 0) {
-          //
-          // Find the entry matching both variable name and vender GUID,
-          // and update counters for all types.
-          //
-          if (Read) {
-            Entry->ReadCount++;
-          }
-          if (Write) {
-            Entry->WriteCount++;
-          }
-          if (Delete) {
-            Entry->DeleteCount++;
-          }
-          if (Cache) {
-            Entry->CacheCount++;
-          }
-
-          return;
-        }
-      }
-
-      if (Entry->Next == NULL) {
-        //
-        // If the entry is not in the table add it.
-        // Next iteration of the loop will fill in the data
-        //
-        Entry->Next = AllocateZeroPool (sizeof (VARIABLE_INFO_ENTRY));
-        ASSERT (Entry->Next != NULL);
-
-        CopyGuid (&Entry->Next->VendorGuid, VendorGuid);
-        Entry->Next->Name = AllocatePool (StrSize (VariableName));
-        ASSERT (Entry->Next->Name != NULL);
-        StrCpyS (Entry->Next->Name, StrSize (VariableName) / sizeof (CHAR16), VariableName);
-        Entry->Next->Volatile = Volatile;
-      }
-
-    }
-  }
-}
-
-/**
-  Updates variable in cache.
-
-  This function searches the variable cache. If the variable to set exists in the cache,
-  it updates the variable in cache. It has the same parameters with UEFI SetVariable()
-  service.
-
-  @param[in]  VariableName  A Null-terminated Unicode string that is the name of the vendor's
-                            variable.  Each VariableName is unique for each VendorGuid.
-  @param[in]  VendorGuid    A unique identifier for the vendor.
-  @param[in]  Attributes    Attributes bitmask to set for the variable.
-  @param[in]  DataSize      The size in bytes of the Data buffer.  A size of zero causes the
-                            variable to be deleted.
-  @param[in]  Data          The contents for the variable.
-
-**/
-VOID
-UpdateVariableCache (
-  IN      CHAR16            *VariableName,
-  IN      EFI_GUID          *VendorGuid,
-  IN      UINT32            Attributes,
-  IN      UINTN             DataSize,
-  IN      VOID              *Data
-  )
-{
-  VARIABLE_CACHE_ENTRY      *Entry;
-  UINTN                     Index;
-
-  if (EfiAtRuntime ()) {
-    //
-    // Don't use the cache at runtime
-    //
-    return;
-  }
-
-  //
-  // Searches cache for the variable to update. If it exists, update it.
-  //
-  for (Index = 0, Entry = mVariableCache; Index < sizeof (mVariableCache)/sizeof (VARIABLE_CACHE_ENTRY); Index++, Entry++) {
-    if (CompareGuid (VendorGuid, Entry->Guid)) {
-      if (StrCmp (VariableName, Entry->Name) == 0) { 
-        Entry->Attributes = Attributes;
-        if (DataSize == 0) {
-          //
-          // If DataSize is 0, delete the variable.
-          //
-          if (Entry->DataSize != 0) {
-            FreePool (Entry->Data);
-          }
-          Entry->DataSize = DataSize;
-        } else if (DataSize == Entry->DataSize) {
-          //
-          // If size of data does not change, simply copy data
-          //
-          CopyMem (Entry->Data, Data, DataSize);
-        } else {
-          //
-          // If size of data changes, allocate pool and copy data.
-          //
-          Entry->Data = AllocatePool (DataSize);
-          ASSERT (Entry->Data != NULL);
-          Entry->DataSize = DataSize;
-          CopyMem (Entry->Data, Data, DataSize);
-        }
-      }
-    }
-  }
-}
-
-
-/**
-  Search the cache to check if the variable is in it.
-
-  This function searches the variable cache. If the variable to find exists, return its data
-  and attributes.
-
-  @param[in]      VariableName   A Null-terminated Unicode string that is the name of the vendor's
-                                 variable.  Each VariableName is unique for each VendorGuid.
-  @param[in]      VendorGuid     A unique identifier for the vendor
-  @param[out]     Attributes     Pointer to the attributes bitmask of the variable for output.
-  @param[in, out] DataSize       On input, size of the buffer of Data.
-                                 On output, size of the variable's data.
-  @param[out]     Data           Pointer to the data buffer for output.
-
-  @retval EFI_SUCCESS           VariableGuid & VariableName data was returned.
-  @retval EFI_NOT_FOUND         No matching variable found in cache.
-  @retval EFI_BUFFER_TOO_SMALL  *DataSize is smaller than size of the variable's data to return.
-
-**/
-EFI_STATUS
-FindVariableInCache (
-  IN      CHAR16            *VariableName,
-  IN      EFI_GUID          *VendorGuid,
-  OUT     UINT32            *Attributes OPTIONAL,
-  IN OUT  UINTN             *DataSize,
-  OUT     VOID              *Data
-  )
-{
-  VARIABLE_CACHE_ENTRY      *Entry;
-  UINTN                     Index;
-
-  if (EfiAtRuntime ()) {
-    //
-    // Don't use the cache at runtime
-    //
-    return EFI_NOT_FOUND;
-  }
-
-  //
-  // Searches cache for the variable
-  //
-  for (Index = 0, Entry = mVariableCache; Index < sizeof (mVariableCache)/sizeof (VARIABLE_CACHE_ENTRY); Index++, Entry++) {
-    if (CompareGuid (VendorGuid, Entry->Guid)) {
-      if (StrCmp (VariableName, Entry->Name) == 0) {
-        if (Entry->DataSize == 0) {
-          //
-          // Variable has been deleted so return EFI_NOT_FOUND
-          //
-          return EFI_NOT_FOUND;
-        } else if (Entry->DataSize > *DataSize) {
-          //
-          // If buffer is too small, return the size needed and EFI_BUFFER_TOO_SMALL
-          //
-          *DataSize = Entry->DataSize;
-          return EFI_BUFFER_TOO_SMALL;
-        } else {
-          //
-          // If buffer is large enough, return the data
-          //
-          *DataSize = Entry->DataSize;
-          CopyMem (Data, Entry->Data, Entry->DataSize);
-          //
-          // If Attributes is not NULL, return the variable's attribute.
-          //
-          if (Attributes != NULL) {
-            *Attributes = Entry->Attributes;
-          }
-          return EFI_SUCCESS;
-        }
-      }
-    }
-  }
-  
-  return EFI_NOT_FOUND;
-}
-
-/**
-  Finds variable in volatile and non-volatile storage areas.
-
-  This code finds variable in volatile and non-volatile storage areas.
-  If VariableName is an empty string, then we just return the first
-  qualified variable without comparing VariableName and VendorGuid.
-  Otherwise, VariableName and VendorGuid are compared.
-
-  @param[in]  VariableName            Name of the variable to be found.
-  @param[in]  VendorGuid              Vendor GUID to be found.
-  @param[out] PtrTrack                VARIABLE_POINTER_TRACK structure for output,
-                                      including the range searched and the target position.
-  @param[in]  Global                  Pointer to VARIABLE_GLOBAL structure, including
-                                      base of volatile variable storage area, base of
-                                      NV variable storage area, and a lock.
-  @param[in]  Instance                Instance of FV Block services.
-
-  @retval EFI_INVALID_PARAMETER       If VariableName is not an empty string, while
-                                      VendorGuid is NULL.
-  @retval EFI_SUCCESS                 Variable successfully found.
-  @retval EFI_INVALID_PARAMETER       Variable not found.
-
-**/
-EFI_STATUS
-FindVariable (
-  IN  CHAR16                  *VariableName,
-  IN  EFI_GUID                *VendorGuid,
-  OUT VARIABLE_POINTER_TRACK  *PtrTrack,
-  IN  VARIABLE_GLOBAL         *Global,
-  IN  UINTN                   Instance
-  )
-{
-  EFI_PHYSICAL_ADDRESS              Variable[2];
-  EFI_PHYSICAL_ADDRESS              InDeletedVariable;
-  EFI_PHYSICAL_ADDRESS              VariableStoreHeader[2];
-  UINTN                             InDeletedStorageIndex;
-  UINTN                             Index;
-  CHAR16                            LocalVariableName[MAX_NAME_SIZE];
-  BOOLEAN                           Volatile;
-  AUTHENTICATED_VARIABLE_HEADER     VariableHeader;
-
-  //
-  // 0: Volatile, 1: Non-Volatile
-  // The index and attributes mapping must be kept in this order as RuntimeServiceGetNextVariableName
-  // make use of this mapping to implement search algorithme.
-  //
-  VariableStoreHeader[0]  = Global->VolatileVariableBase;
-  VariableStoreHeader[1]  = Global->NonVolatileVariableBase;
-
-  //
-  // Start Pointers for the variable.
-  // Actual Data Pointer where data can be written.
-  //
-  Variable[0] = GetStartPointer (VariableStoreHeader[0]);
-  Variable[1] = GetStartPointer (VariableStoreHeader[1]);
-
-  if (VariableName[0] != 0 && VendorGuid == NULL) {
-    return EFI_INVALID_PARAMETER;
-  }
-
-  //
-  // Find the variable by walk through volatile and then non-volatile variable store
-  //
-  InDeletedVariable     = 0x0;
-  InDeletedStorageIndex = 0;
-  Volatile = TRUE;
-  for (Index = 0; Index < 2; Index++) {
-    if (Index == 1) {
-      Volatile = FALSE;
-    }
-    while (IsValidVariableHeader (Variable[Index], Volatile, Global, Instance, &VariableHeader)) {
-      if (VariableHeader.State == VAR_ADDED || 
-          VariableHeader.State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)
-         ) {
-        if (!EfiAtRuntime () || ((VariableHeader.Attributes & EFI_VARIABLE_RUNTIME_ACCESS) != 0)) {
-          if (VariableName[0] == 0) {
-            //
-            // If VariableName is an empty string, then we just find the first qualified variable
-            // without comparing VariableName and VendorGuid
-            //
-            if (VariableHeader.State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {
-              //
-              // If variable is in delete transition, record it.
-              //
-              InDeletedVariable     = Variable[Index];
-              InDeletedStorageIndex = Index;
-            } else {
-              //
-              // If variable is not in delete transition, return it.
-              //
-              PtrTrack->StartPtr  = GetStartPointer (VariableStoreHeader[Index]);
-              PtrTrack->EndPtr    = GetEndPointer (VariableStoreHeader[Index], Volatile, Global, Instance);
-              PtrTrack->CurrPtr   = Variable[Index];
-              PtrTrack->Volatile  = Volatile;
-
-              return EFI_SUCCESS;
-            }
-          } else {
-            //
-            // If VariableName is not an empty string, then VariableName and VendorGuid are compared.
-            //
-            if (CompareGuid (VendorGuid, &VariableHeader.VendorGuid)) {
-              GetVariableNamePtr (
-                Variable[Index],
-                Volatile,
-                Global,
-                Instance,
-                LocalVariableName
-                );
-
-              ASSERT (NameSizeOfVariable (&VariableHeader) != 0);
-              if (CompareMem (VariableName, LocalVariableName, NameSizeOfVariable (&VariableHeader)) == 0) {
-                if (VariableHeader.State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {
-                  //
-                  // If variable is in delete transition, record it.
-                  // We will use if only no VAR_ADDED variable is found.
-                  //
-                  InDeletedVariable     = Variable[Index];
-                  InDeletedStorageIndex = Index;
-                } else {
-                  //
-                  // If variable is not in delete transition, return it.
-                  //
-                  PtrTrack->StartPtr  = GetStartPointer (VariableStoreHeader[Index]);
-                  PtrTrack->EndPtr    = GetEndPointer (VariableStoreHeader[Index], Volatile, Global, Instance);
-                  PtrTrack->CurrPtr   = Variable[Index];
-                  PtrTrack->Volatile  = Volatile;
-
-                  return EFI_SUCCESS;
-                }
-              }
-            }
-          }
-        }
-      }
-
-      Variable[Index] = GetNextVariablePtr (
-                          Variable[Index],
-                          Volatile,
-                          Global,
-                          Instance
-                          );
-    }
-    if (InDeletedVariable != 0x0) {
-      //
-      // If no VAR_ADDED variable is found, and only variable in delete transition, then use this one.
-      //
-      PtrTrack->StartPtr  = GetStartPointer (VariableStoreHeader[InDeletedStorageIndex]);
-      PtrTrack->EndPtr    = GetEndPointer (
-                              VariableStoreHeader[InDeletedStorageIndex],
-                              (BOOLEAN)(InDeletedStorageIndex == 0),
-                              Global,
-                              Instance
-                              );
-      PtrTrack->CurrPtr   = InDeletedVariable;
-      PtrTrack->Volatile  = (BOOLEAN)(InDeletedStorageIndex == 0);
-      return EFI_SUCCESS;
-    }
-  }
-  PtrTrack->CurrPtr = 0x0;
-  return EFI_NOT_FOUND;
-}
-
-/**
-  Variable store garbage collection and reclaim operation.
-
-  @param[in]  VariableBase        Base address of variable store area.
-  @param[out] LastVariableOffset  Offset of last variable.
-  @param[in]  IsVolatile          The variable store is volatile or not,
-                                  if it is non-volatile, need FTW.
-  @param[in]  VirtualMode         Current calling mode for this function.
-  @param[in]  Global              Context of this Extended SAL Variable Services Class call.
-  @param[in]  UpdatingVariable    Pointer to header of the variable that is being updated.
-
-  @retval EFI_SUCCESS             Variable store successfully reclaimed.
-  @retval EFI_OUT_OF_RESOURCES    Fail to allocate memory buffer to hold all valid variables.
-
-**/
-EFI_STATUS
-Reclaim (
-  IN  EFI_PHYSICAL_ADDRESS  VariableBase,
-  OUT UINTN                 *LastVariableOffset,
-  IN  BOOLEAN               IsVolatile,
-  IN  BOOLEAN               VirtualMode,
-  IN  ESAL_VARIABLE_GLOBAL  *Global,
-  IN  EFI_PHYSICAL_ADDRESS  UpdatingVariable
-  )
-{
-  EFI_PHYSICAL_ADDRESS              Variable;
-  EFI_PHYSICAL_ADDRESS              AddedVariable;
-  EFI_PHYSICAL_ADDRESS              NextVariable;
-  EFI_PHYSICAL_ADDRESS              NextAddedVariable;
-  VARIABLE_STORE_HEADER             VariableStoreHeader;
-  AUTHENTICATED_VARIABLE_HEADER     VariableHeader;
-  AUTHENTICATED_VARIABLE_HEADER     AddedVariableHeader;
-  CHAR16                            VariableName[MAX_NAME_SIZE];
-  CHAR16                            AddedVariableName[MAX_NAME_SIZE];
-  UINT8                             *ValidBuffer;
-  UINTN                             MaximumBufferSize;
-  UINTN                             VariableSize;
-  UINTN                             NameSize;
-  UINT8                             *CurrPtr;
-  BOOLEAN                           FoundAdded;
-  EFI_STATUS                        Status;
-  VARIABLE_GLOBAL                   *VariableGlobal;
-  UINT32                            Instance;
-
-  VariableGlobal = &Global->VariableGlobal[VirtualMode];
-  Instance = Global->FvbInstance;
-
-  GetVarStoreHeader (VariableBase, IsVolatile, VariableGlobal, Instance, &VariableStoreHeader);
-  //
-  // recaluate the total size of Common/HwErr type variables in non-volatile area.
-  //
-  if (!IsVolatile) {
-    Global->CommonVariableTotalSize = 0;
-    Global->HwErrVariableTotalSize  = 0;
-  }
-
-  //
-  // Calculate the size of buffer needed to gather all valid variables
-  //
-  Variable          = GetStartPointer (VariableBase);
-  MaximumBufferSize = sizeof (VARIABLE_STORE_HEADER);
-
-  while (IsValidVariableHeader (Variable, IsVolatile, VariableGlobal, Instance, &VariableHeader)) {
-    NextVariable = GetNextVariablePtr (Variable, IsVolatile, VariableGlobal, Instance);
-    //
-    // Collect VAR_ADDED variables, and variables in delete transition status.
-    //
-    if (VariableHeader.State == VAR_ADDED || 
-        VariableHeader.State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)
-       ) {
-      VariableSize = NextVariable - Variable;
-      MaximumBufferSize += VariableSize;
-    }
-
-    Variable = NextVariable;
-  }
-
-  //
-  // Reserve the 1 Bytes with Oxff to identify the 
-  // end of the variable buffer. 
-  // 
-  MaximumBufferSize += 1;
-  ValidBuffer = AllocatePool (MaximumBufferSize);
-  if (ValidBuffer == NULL) {
-    return EFI_OUT_OF_RESOURCES;
-  }
-
-  SetMem (ValidBuffer, MaximumBufferSize, 0xff);
-
-  //
-  // Copy variable store header
-  //
-  CopyMem (ValidBuffer, &VariableStoreHeader, sizeof (VARIABLE_STORE_HEADER));
-  CurrPtr = (UINT8 *) GetStartPointer ((EFI_PHYSICAL_ADDRESS) ValidBuffer);
-
-  //
-  // Reinstall all ADDED variables
-  // 
-  Variable = GetStartPointer (VariableBase);
-  while (IsValidVariableHeader (Variable, IsVolatile, VariableGlobal, Instance, &VariableHeader)) {
-    NextVariable = GetNextVariablePtr (Variable, IsVolatile, VariableGlobal, Instance);
-    if (VariableHeader.State == VAR_ADDED) {
-      VariableSize = NextVariable - Variable;
-      CopyMem (CurrPtr, (UINT8 *) Variable, VariableSize);
-      CurrPtr += VariableSize;
-      if ((!IsVolatile) && ((((AUTHENTICATED_VARIABLE_HEADER*)Variable)->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
-        Global->HwErrVariableTotalSize += VariableSize;
-      } else if ((!IsVolatile) && ((((AUTHENTICATED_VARIABLE_HEADER*)Variable)->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
-        Global->CommonVariableTotalSize += VariableSize;
-      }
-    }
-    Variable = NextVariable;
-  }
-  //
-  // Reinstall in delete transition variables
-  // 
-  Variable = GetStartPointer (VariableBase);
-  while (IsValidVariableHeader (Variable, IsVolatile, VariableGlobal, Instance, &VariableHeader)) {
-    NextVariable = GetNextVariablePtr (Variable, IsVolatile, VariableGlobal, Instance);
-    if (VariableHeader.State == (VAR_IN_DELETED_TRANSITION & VAR_ADDED)) {
-
-      //
-      // Buffer has cached all ADDED variable. 
-      // Per IN_DELETED variable, we have to guarantee that
-      // no ADDED one in previous buffer. 
-      // 
-      FoundAdded = FALSE;
-      AddedVariable = GetStartPointer ((EFI_PHYSICAL_ADDRESS) ValidBuffer);
-      while (IsValidVariableHeader (AddedVariable, IsVolatile, VariableGlobal, Instance, &AddedVariableHeader)) {
-        NextAddedVariable = GetNextVariablePtr (AddedVariable, IsVolatile, VariableGlobal, Instance);
-        NameSize = NameSizeOfVariable (&AddedVariableHeader);
-        if (CompareGuid (&AddedVariableHeader.VendorGuid, &VariableHeader.VendorGuid) &&
-            NameSize == NameSizeOfVariable (&VariableHeader)
-           ) {
-          GetVariableNamePtr (Variable, IsVolatile, VariableGlobal, Instance, VariableName);
-          GetVariableNamePtr (AddedVariable, IsVolatile, VariableGlobal, Instance, AddedVariableName);
-          if (CompareMem (VariableName, AddedVariableName, NameSize) == 0) {
-            //
-            // If ADDED variable with the same name and vender GUID has been reinstalled,
-            // then discard this IN_DELETED copy.
-            //
-            FoundAdded = TRUE;
-            break;
-          }
-        }
-        AddedVariable = NextAddedVariable;
-      }
-      //
-      // Add IN_DELETE variables that have not been added to buffer
-      //
-      if (!FoundAdded) {
-        VariableSize = NextVariable - Variable;
-        CopyMem (CurrPtr, (UINT8 *) Variable, VariableSize);
-        if (Variable != UpdatingVariable) {
-          //
-          // Make this IN_DELETE instance valid if:
-          // 1. No valid instance of this variable exists.
-          // 2. It is not the variable that is going to be updated.
-          //
-          ((AUTHENTICATED_VARIABLE_HEADER *) CurrPtr)->State = VAR_ADDED;
-        }
-        CurrPtr += VariableSize;
-        if ((!IsVolatile) && ((((AUTHENTICATED_VARIABLE_HEADER*)Variable)->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
-          Global->HwErrVariableTotalSize += VariableSize;
-        } else if ((!IsVolatile) && ((((AUTHENTICATED_VARIABLE_HEADER*)Variable)->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
-          Global->CommonVariableTotalSize += VariableSize;
-        }
-      }
-    }
-    Variable = NextVariable;
-  }
-
-  if (IsVolatile) {
-    //
-    // If volatile variable store, just copy valid buffer
-    //
-    SetMem ((UINT8 *) (UINTN) VariableBase, VariableStoreHeader.Size, 0xff);
-    CopyMem ((UINT8 *) (UINTN) VariableBase, ValidBuffer, (UINTN) (CurrPtr - (UINT8 *) ValidBuffer));
-    Status = EFI_SUCCESS;
-  } else {
-    //
-    // If non-volatile variable store, perform FTW here.
-    // Write ValidBuffer to destination specified by VariableBase.
-    //
-    Status = FtwVariableSpace (
-               VariableBase,
-               ValidBuffer,
-               (UINTN) (CurrPtr - (UINT8 *) ValidBuffer)
-               );
-  }
-  if (!EFI_ERROR (Status)) {
-    *LastVariableOffset = (UINTN) (CurrPtr - (UINT8 *) ValidBuffer);
-  } else {
-    *LastVariableOffset = 0;
-  }
-
-  FreePool (ValidBuffer);
-
-  return Status;
-}
-
-/**
-  Get index from supported language codes according to language string.
-
-  This code is used to get corresponding index in supported language codes. It can handle
-  RFC4646 and ISO639 language tags.
-  In ISO639 language tags, take 3-characters as a delimitation to find matched string and calculate the index.
-  In RFC4646 language tags, take semicolon as a delimitation to find matched string and calculate the index.
-
-  For example:
-    SupportedLang  = "engfraengfra"
-    Lang           = "eng"
-    Iso639Language = TRUE
-  The return value is "0".
-  Another example:
-    SupportedLang  = "en;fr;en-US;fr-FR"
-    Lang           = "fr-FR"
-    Iso639Language = FALSE
-  The return value is "3".
-
-  @param[in]  SupportedLang          Platform supported language codes.
-  @param[in]  Lang                   Configured language.
-  @param[in]  Iso639Language         A bool value to signify if the handler is operated on ISO639 or RFC4646.
-
-  @return                            The index of language in the language codes.
-
-**/
-UINTN
-GetIndexFromSupportedLangCodes(
-  IN  CHAR8            *SupportedLang,
-  IN  CHAR8            *Lang,
-  IN  BOOLEAN          Iso639Language
-  ) 
-{
-  UINTN    Index;
-  UINTN    CompareLength;
-  UINTN    LanguageLength;
-
-  if (Iso639Language) {
-    CompareLength = ISO_639_2_ENTRY_SIZE;
-    for (Index = 0; Index < AsciiStrLen (SupportedLang); Index += CompareLength) {
-      if (AsciiStrnCmp (Lang, SupportedLang + Index, CompareLength) == 0) {
-        //
-        // Successfully find the index of Lang string in SupportedLang string.
-        //
-        Index = Index / CompareLength;
-        return Index;
-      }
-    }
-    ASSERT (FALSE);
-    return 0;
-  } else {
-    //
-    // Compare RFC4646 language code
-    //
-    Index = 0;
-    for (LanguageLength = 0; Lang[LanguageLength] != '\0'; LanguageLength++);
-
-    for (Index = 0; *SupportedLang != '\0'; Index++, SupportedLang += CompareLength) {
-      //
-      // Skip ';' characters in SupportedLang
-      //
-      for (; *SupportedLang != '\0' && *SupportedLang == ';'; SupportedLang++);
-      //
-      // Determine the length of the next language code in SupportedLang
-      //
-      for (CompareLength = 0; SupportedLang[CompareLength] != '\0' && SupportedLang[CompareLength] != ';'; CompareLength++);
-      
-      if ((CompareLength == LanguageLength) && 
-          (AsciiStrnCmp (Lang, SupportedLang, CompareLength) == 0)) {
-        //
-        // Successfully find the index of Lang string in SupportedLang string.
-        //
-        return Index;
-      }
-    }
-    ASSERT (FALSE);
-    return 0;
-  }
-}
-
-/**
-  Get language string from supported language codes according to index.
-
-  This code is used to get corresponding language string in supported language codes. It can handle
-  RFC4646 and ISO639 language tags.
-  In ISO639 language tags, take 3-characters as a delimitation. Find language string according to the index.
-  In RFC4646 language tags, take semicolon as a delimitation. Find language string according to the index.
-
-  For example:
-    SupportedLang  = "engfraengfra"
-    Index          = "1"
-    Iso639Language = TRUE
-  The return value is "fra".
-  Another example:
-    SupportedLang  = "en;fr;en-US;fr-FR"
-    Index          = "1"
-    Iso639Language = FALSE
-  The return value is "fr".
-
-  @param[in]  SupportedLang   Platform supported language codes.
-  @param[in]  Index           the index in supported language codes.
-  @param[in]  Iso639Language  A bool value to signify if the handler is operated on ISO639 or RFC4646.
-  @param[in]  VirtualMode     Current calling mode for this function.
-  @param[in]  Global          Context of this Extended SAL Variable Services Class call.
-
-  @return                     The language string in the language codes.
-
-**/
-CHAR8 *
-GetLangFromSupportedLangCodes (
-  IN  CHAR8                 *SupportedLang,
-  IN  UINTN                 Index,
-  IN  BOOLEAN               Iso639Language,
-  IN  BOOLEAN               VirtualMode,
-  IN  ESAL_VARIABLE_GLOBAL  *Global
-  )
-{
-  UINTN    SubIndex;
-  UINTN    CompareLength;
-  CHAR8    *Supported;
-
-  SubIndex  = 0;
-  Supported = SupportedLang;
-  if (Iso639Language) {
-    //
-    // according to the index of Lang string in SupportedLang string to get the language.
-    // As this code will be invoked in RUNTIME, therefore there is not memory allocate/free operation.
-    // In driver entry, it pre-allocates a runtime attribute memory to accommodate this string.
-    //
-    CompareLength = ISO_639_2_ENTRY_SIZE;
-    Global->Lang[CompareLength] = '\0';
-    return CopyMem (Global->Lang, SupportedLang + Index * CompareLength, CompareLength);
-
-  } else {
-    while (TRUE) {
-      //
-      // take semicolon as delimitation, sequentially traverse supported language codes.
-      //
-      for (CompareLength = 0; *Supported != ';' && *Supported != '\0'; CompareLength++) {
-        Supported++;
-      }
-      if ((*Supported == '\0') && (SubIndex != Index)) {
-        //
-        // Have completed the traverse, but not find corrsponding string.
-        // This case is not allowed to happen.
-        //
-        ASSERT(FALSE);
-        return NULL;
-      }
-      if (SubIndex == Index) {
-        //
-        // according to the index of Lang string in SupportedLang string to get the language.
-        // As this code will be invoked in RUNTIME, therefore there is not memory allocate/free operation.
-        // In driver entry, it pre-allocates a runtime attribute memory to accommodate this string.
-        //
-        Global->PlatformLang[VirtualMode][CompareLength] = '\0';
-        return CopyMem (Global->PlatformLang[VirtualMode], Supported - CompareLength, CompareLength);
-      }
-      SubIndex++;
-
-      //
-      // Skip ';' characters in Supported
-      //
-      for (; *Supported != '\0' && *Supported == ';'; Supported++);
-    }
-  }
-}
-
-/**
-  Returns a pointer to an allocated buffer that contains the best matching language 
-  from a set of supported languages.  
-  
-  This function supports both ISO 639-2 and RFC 4646 language codes, but language 
-  code types may not be mixed in a single call to this function. This function
-  supports a variable argument list that allows the caller to pass in a prioritized
-  list of language codes to test against all the language codes in SupportedLanguages.
-
-  If SupportedLanguages is NULL, then ASSERT().
-
-  @param[in]  SupportedLanguages  A pointer to a Null-terminated ASCII string that
-                                  contains a set of language codes in the format 
-                                  specified by Iso639Language.
-  @param[in]  Iso639Language      If TRUE, then all language codes are assumed to be
-                                  in ISO 639-2 format.  If FALSE, then all language
-                                  codes are assumed to be in RFC 4646 language format.
-  @param[in]  VirtualMode         Current calling mode for this function.
-  @param[in]  ...                 A variable argument list that contains pointers to 
-                                  Null-terminated ASCII strings that contain one or more
-                                  language codes in the format specified by Iso639Language.
-                                  The first language code from each of these language
-                                  code lists is used to determine if it is an exact or
-                                  close match to any of the language codes in 
-                                  SupportedLanguages.  Close matches only apply to RFC 4646
-                                  language codes, and the matching algorithm from RFC 4647
-                                  is used to determine if a close match is present.  If 
-                                  an exact or close match is found, then the matching
-                                  language code from SupportedLanguages is returned.  If
-                                  no matches are found, then the next variable argument
-                                  parameter is evaluated.  The variable argument list 
-                                  is terminated by a NULL.
-
-  @retval NULL   The best matching language could not be found in SupportedLanguages.
-  @retval NULL   There are not enough resources available to return the best matching 
-                 language.
-  @retval Other  A pointer to a Null-terminated ASCII string that is the best matching 
-                 language in SupportedLanguages.
-
-**/
-CHAR8 *
-VariableGetBestLanguage (
-  IN CONST CHAR8  *SupportedLanguages, 
-  IN BOOLEAN      Iso639Language,
-  IN BOOLEAN      VirtualMode,
-  ...
-  )
-{
-  VA_LIST      Args;
-  CHAR8        *Language;
-  UINTN        CompareLength;
-  UINTN        LanguageLength;
-  CONST CHAR8  *Supported;
-  CHAR8        *Buffer;
-
-  ASSERT (SupportedLanguages != NULL);
-
-  VA_START (Args, VirtualMode);
-  while ((Language = VA_ARG (Args, CHAR8 *)) != NULL) {
-    //
-    // Default to ISO 639-2 mode
-    //
-    CompareLength  = 3;
-    LanguageLength = MIN (3, AsciiStrLen (Language));
-
-    //
-    // If in RFC 4646 mode, then determine the length of the first RFC 4646 language code in Language
-    //
-    if (!Iso639Language) {
-      for (LanguageLength = 0; Language[LanguageLength] != 0 && Language[LanguageLength] != ';'; LanguageLength++);
-    }
-
-    //
-    // Trim back the length of Language used until it is empty
-    //
-    while (LanguageLength > 0) {
-      //
-      // Loop through all language codes in SupportedLanguages
-      //
-      for (Supported = SupportedLanguages; *Supported != '\0'; Supported += CompareLength) {
-        //
-        // In RFC 4646 mode, then Loop through all language codes in SupportedLanguages
-        //
-        if (!Iso639Language) {
-          //
-          // Skip ';' characters in Supported
-          //
-          for (; *Supported != '\0' && *Supported == ';'; Supported++);
-          //
-          // Determine the length of the next language code in Supported
-          //
-          for (CompareLength = 0; Supported[CompareLength] != 0 && Supported[CompareLength] != ';'; CompareLength++);
-          //
-          // If Language is longer than the Supported, then skip to the next language
-          //
-          if (LanguageLength > CompareLength) {
-            continue;
-          }
-        }
-        //
-        // See if the first LanguageLength characters in Supported match Language
-        //
-        if (AsciiStrnCmp (Supported, Language, LanguageLength) == 0) {
-          VA_END (Args);
-
-          Buffer = Iso639Language ? mVariableModuleGlobal->Lang : mVariableModuleGlobal->PlatformLang[VirtualMode];
-          Buffer[CompareLength] = '\0';
-          return CopyMem (Buffer, Supported, CompareLength);
-        }
-      }
-
-      if (Iso639Language) {
-        //
-        // If ISO 639 mode, then each language can only be tested once
-        //
-        LanguageLength = 0;
-      } else {
-        //
-        // If RFC 4646 mode, then trim Language from the right to the next '-' character 
-        //
-        for (LanguageLength--; LanguageLength > 0 && Language[LanguageLength] != '-'; LanguageLength--);
-      }
-    }
-  }
-  VA_END (Args);
-
-  //
-  // No matches were found 
-  //
-  return NULL;
-}
-
-/**
-  Hook the operations in PlatformLangCodes, LangCodes, PlatformLang and Lang.
-
-  When setting Lang/LangCodes, simultaneously update PlatformLang/PlatformLangCodes.
-  According to UEFI spec, PlatformLangCodes/LangCodes are only set once in firmware initialization,
-  and are read-only. Therefore, in variable driver, only store the original value for other use.
-
-  @param[in] VariableName  Name of variable.
-  @param[in] Data          Variable data.
-  @param[in] DataSize      Size of data. 0 means delete.
-  @param[in] VirtualMode   Current calling mode for this function.
-  @param[in] Global        Context of this Extended SAL Variable Services Class call.
-
-**/
-VOID
-AutoUpdateLangVariable(
-  IN  CHAR16                *VariableName,
-  IN  VOID                  *Data,
-  IN  UINTN                 DataSize,
-  IN  BOOLEAN               VirtualMode,
-  IN  ESAL_VARIABLE_GLOBAL  *Global
-  )
-{
-  EFI_STATUS              Status;
-  CHAR8                   *BestPlatformLang;
-  CHAR8                   *BestLang;
-  UINTN                   Index;
-  UINT32                  Attributes;
-  VARIABLE_POINTER_TRACK  Variable;
-  BOOLEAN                 SetLanguageCodes;
-  CHAR16                  **PredefinedVariableName;
-  VARIABLE_GLOBAL         *VariableGlobal;
-  UINT32                  Instance;
-
-  //
-  // Don't do updates for delete operation
-  //
-  if (DataSize == 0) {
-    return;
-  }
-
-  SetLanguageCodes = FALSE;
-  VariableGlobal   = &Global->VariableGlobal[VirtualMode];
-  Instance         = Global->FvbInstance;
-
-
-  PredefinedVariableName = &Global->VariableName[VirtualMode][0];
-  if (StrCmp (VariableName, PredefinedVariableName[VAR_PLATFORM_LANG_CODES]) == 0) {
-    //
-    // PlatformLangCodes is a volatile variable, so it can not be updated at runtime.
-    //
-    if (EfiAtRuntime ()) {
-      return;
-    }
-
-    SetLanguageCodes = TRUE;
-
-    //
-    // According to UEFI spec, PlatformLangCodes is only set once in firmware initialization, and is read-only
-    // Therefore, in variable driver, only store the original value for other use.
-    //
-    if (Global->PlatformLangCodes[VirtualMode] != NULL) {
-      FreePool (Global->PlatformLangCodes[VirtualMode]);
-    }
-    Global->PlatformLangCodes[VirtualMode] = AllocateRuntimeCopyPool (DataSize, Data);
-    ASSERT (Global->PlatformLangCodes[VirtualMode] != NULL);
-
-    //
-    // PlatformLang holds a single language from PlatformLangCodes, 
-    // so the size of PlatformLangCodes is enough for the PlatformLang.
-    //
-    if (Global->PlatformLang[VirtualMode] != NULL) {
-      FreePool (Global->PlatformLang[VirtualMode]);
-    }
-    Global->PlatformLang[VirtualMode] = AllocateRuntimePool (DataSize);
-    ASSERT (Global->PlatformLang[VirtualMode] != NULL);
-
-  } else if (StrCmp (VariableName, PredefinedVariableName[VAR_LANG_CODES]) == 0) {
-    //
-    // LangCodes is a volatile variable, so it can not be updated at runtime.
-    //
-    if (EfiAtRuntime ()) {
-      return;
-    }
-
-    SetLanguageCodes = TRUE;
-
-    //
-    // According to UEFI spec, LangCodes is only set once in firmware initialization, and is read-only
-    // Therefore, in variable driver, only store the original value for other use.
-    //
-    if (Global->LangCodes[VirtualMode] != NULL) {
-      FreePool (Global->LangCodes[VirtualMode]);
-    }
-    Global->LangCodes[VirtualMode] = AllocateRuntimeCopyPool (DataSize, Data);
-    ASSERT (Global->LangCodes[VirtualMode] != NULL);
-  }
-
-  if (SetLanguageCodes 
-      && (Global->PlatformLangCodes[VirtualMode] != NULL)
-      && (Global->LangCodes[VirtualMode] != NULL)) {
-    //
-    // Update Lang if PlatformLang is already set
-    // Update PlatformLang if Lang is already set
-    //
-    Status = FindVariable (PredefinedVariableName[VAR_PLATFORM_LANG], Global->GlobalVariableGuid[VirtualMode], &Variable, VariableGlobal, Instance);
-    if (!EFI_ERROR (Status)) {
-      //
-      // Update Lang
-      //
-      VariableName = PredefinedVariableName[VAR_PLATFORM_LANG];
-    } else {
-      Status = FindVariable (PredefinedVariableName[VAR_LANG], Global->GlobalVariableGuid[VirtualMode], &Variable, VariableGlobal, Instance);
-      if (!EFI_ERROR (Status)) {
-        //
-        // Update PlatformLang
-        //
-        VariableName = PredefinedVariableName[VAR_LANG];
-      } else {
-        //
-        // Neither PlatformLang nor Lang is set, directly return
-        //
-        return;
-      }
-    }
-    Data    = (VOID *) GetEndPointer (VariableGlobal->VolatileVariableBase, TRUE, VariableGlobal, Instance);
-    GetVariableDataPtr ((EFI_PHYSICAL_ADDRESS) Variable.CurrPtr, Variable.Volatile, VariableGlobal, Instance, (CHAR16 *) Data);
-
-    Status = AccessVariableStore (
-               FALSE,
-               VariableGlobal,
-               Variable.Volatile,
-               Instance,
-               (UINTN) &(((AUTHENTICATED_VARIABLE_HEADER *)Variable.CurrPtr)->DataSize),
-               sizeof (DataSize),
-               &DataSize
-               ); 
-    ASSERT_EFI_ERROR (Status);
-  }
-
-  //
-  // According to UEFI spec, "Lang" and "PlatformLang" is NV|BS|RT attributions.
-  //
-  Attributes = EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS;
-
-  if (StrCmp (VariableName, PredefinedVariableName[VAR_PLATFORM_LANG]) == 0) {
-    //
-    // Update Lang when PlatformLangCodes/LangCodes were set.
-    //
-    if ((Global->PlatformLangCodes[VirtualMode] != NULL) && (Global->LangCodes[VirtualMode] != NULL)) {
-      //
-      // When setting PlatformLang, firstly get most matched language string from supported language codes.
-      //
-      BestPlatformLang = VariableGetBestLanguage (Global->PlatformLangCodes[VirtualMode], FALSE, VirtualMode, Data, NULL);
-      if (BestPlatformLang != NULL) {
-        //
-        // Get the corresponding index in language codes.
-        //
-        Index = GetIndexFromSupportedLangCodes (Global->PlatformLangCodes[VirtualMode], BestPlatformLang, FALSE);
-
-        //
-        // Get the corresponding ISO639 language tag according to RFC4646 language tag.
-        //
-        BestLang = GetLangFromSupportedLangCodes (Global->LangCodes[VirtualMode], Index, TRUE, VirtualMode, Global);
-
-        //
-        // Successfully convert PlatformLang to Lang, and set the BestLang value into Lang variable simultaneously.
-        //
-        FindVariable (PredefinedVariableName[VAR_LANG], Global->GlobalVariableGuid[VirtualMode], &Variable, VariableGlobal, Instance);
-
-        Status = UpdateVariable (
-                   PredefinedVariableName[VAR_LANG],
-                   Global->GlobalVariableGuid[VirtualMode],
-                   BestLang,
-                   ISO_639_2_ENTRY_SIZE + 1,
-                   Attributes,
-                   0,
-                   0,
-                   VirtualMode,
-                   Global,
-                   &Variable
-                   );
-
-        DEBUG ((EFI_D_INFO, "Variable Driver Auto Update PlatformLang, PlatformLang:%a, Lang:%a\n", BestPlatformLang, BestLang));
-
-        ASSERT_EFI_ERROR (Status);
-      }
-    }
-
-  } else if (StrCmp (VariableName, PredefinedVariableName[VAR_LANG]) == 0) {
-    //
-    // Update PlatformLang when PlatformLangCodes/LangCodes were set.
-    //
-    if ((Global->PlatformLangCodes[VirtualMode] != NULL) && (Global->LangCodes[VirtualMode] != NULL)) {
-      //
-      // When setting Lang, firstly get most matched language string from supported language codes.
-      //
-      BestLang = VariableGetBestLanguage (Global->LangCodes[VirtualMode], TRUE, VirtualMode, Data, NULL);
-      if (BestLang != NULL) {
-        //
-        // Get the corresponding index in language codes.
-        //
-        Index = GetIndexFromSupportedLangCodes (Global->LangCodes[VirtualMode], BestLang, TRUE);
-
-        //
-        // Get the corresponding RFC4646 language tag according to ISO639 language tag.
-        //
-        BestPlatformLang = GetLangFromSupportedLangCodes (Global->PlatformLangCodes[VirtualMode], Index, FALSE, VirtualMode, Global);
-
-        //
-        // Successfully convert Lang to PlatformLang, and set the BestPlatformLang value into PlatformLang variable simultaneously.
-        //
-        FindVariable (PredefinedVariableName[VAR_PLATFORM_LANG], Global->GlobalVariableGuid[VirtualMode], &Variable, VariableGlobal, Instance);
-
-        Status = UpdateVariable (
-                   PredefinedVariableName[VAR_PLATFORM_LANG], 
-                   Global->GlobalVariableGuid[VirtualMode], 
-                   BestPlatformLang, 
-                   AsciiStrSize (BestPlatformLang), 
-                   Attributes, 
-                   0,
-                   0,
-                   VirtualMode, 
-                   Global, 
-                   &Variable
-                   );
-
-        DEBUG ((EFI_D_INFO, "Variable Driver Auto Update Lang, Lang:%a, PlatformLang:%a\n", BestLang, BestPlatformLang));
-        ASSERT_EFI_ERROR (Status);
-      }
-    }
-  }
-}
-
-/**
-  Update the variable region with Variable information. These are the same 
-  arguments as the EFI Variable services.
-
-  @param[in] VariableName       Name of variable.
-  @param[in] VendorGuid         Guid of variable.
-  @param[in] Data               Variable data.
-  @param[in] DataSize           Size of data. 0 means delete.
-  @param[in] Attributes         Attributes of the variable.
-  @param[in] KeyIndex           Index of associated public key.
-  @param[in] MonotonicCount     Value of associated monotonic count. 
-  @param[in] VirtualMode        Current calling mode for this function.
-  @param[in] Global             Context of this Extended SAL Variable Services Class call.
-  @param[in] Variable           The variable information which is used to keep track of variable usage.
-
-  @retval EFI_SUCCESS           The update operation is success.
-  @retval EFI_OUT_OF_RESOURCES  Variable region is full, can not write other data into this region.
-
-**/
-EFI_STATUS
-EFIAPI
-UpdateVariable (
-  IN      CHAR16                  *VariableName,
-  IN      EFI_GUID                *VendorGuid,
-  IN      VOID                    *Data,
-  IN      UINTN                   DataSize,
-  IN      UINT32                  Attributes OPTIONAL,  
-  IN      UINT32                  KeyIndex  OPTIONAL,
-  IN      UINT64                  MonotonicCount  OPTIONAL,
-  IN      BOOLEAN                 VirtualMode,
-  IN      ESAL_VARIABLE_GLOBAL    *Global,
-  IN      VARIABLE_POINTER_TRACK  *Variable
-  )
-{
-  EFI_STATUS                          Status;
-  AUTHENTICATED_VARIABLE_HEADER       *NextVariable;
-  UINTN                               VarNameOffset;
-  UINTN                               VarDataOffset;
-  UINTN                               VarNameSize;
-  UINTN                               VarSize;
-  BOOLEAN                             Volatile;
-  UINT8                               State;
-  AUTHENTICATED_VARIABLE_HEADER       VariableHeader;
-  AUTHENTICATED_VARIABLE_HEADER       *NextVariableHeader;
-  BOOLEAN                             Valid;
-  BOOLEAN                             Reclaimed;
-  VARIABLE_STORE_HEADER               VariableStoreHeader;
-  UINTN                               ScratchSize;
-  VARIABLE_GLOBAL                     *VariableGlobal;
-  UINT32                              Instance;
-
-  VariableGlobal = &Global->VariableGlobal[VirtualMode];
-  Instance = Global->FvbInstance;
-
-  Reclaimed  = FALSE;
-
-  if (Variable->CurrPtr != 0) {
-
-    Valid = IsValidVariableHeader (Variable->CurrPtr, Variable->Volatile, VariableGlobal, Instance, &VariableHeader);
-    if (!Valid) {
-      Status = EFI_NOT_FOUND;
-      goto Done;
-    }
-
-    //
-    // Update/Delete existing variable
-    //
-    Volatile = Variable->Volatile;
-    
-    if (EfiAtRuntime ()) {        
-      //
-      // If EfiAtRuntime and the variable is Volatile and Runtime Access,  
-      // the volatile is ReadOnly, and SetVariable should be aborted and 
-      // return EFI_WRITE_PROTECTED.
-      //
-      if (Variable->Volatile) {
-        Status = EFI_WRITE_PROTECTED;
-        goto Done;
-      }
-      //
-      // Only variable have NV attribute can be updated/deleted in Runtime
-      //
-      if ((VariableHeader.Attributes & EFI_VARIABLE_NON_VOLATILE) == 0) {
-        Status = EFI_INVALID_PARAMETER;
-        goto Done;      
-      }
-    }
-    //
-    // Setting a data variable with no access, or zero DataSize attributes
-    // specified causes it to be deleted.
-    //
-    if (DataSize == 0 || (Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0) {    
-      State = VariableHeader.State;
-      State &= VAR_DELETED;
-
-      Status = AccessVariableStore (
-                 TRUE,
-                 VariableGlobal,
-                 Variable->Volatile,
-                 Instance,
-                 (UINTN) &(((AUTHENTICATED_VARIABLE_HEADER *)Variable->CurrPtr)->State),
-                 sizeof (UINT8),
-                 &State
-                 ); 
-      if (!EFI_ERROR (Status)) {
-        UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, FALSE, TRUE, FALSE);
-        UpdateVariableCache (VariableName, VendorGuid, Attributes, DataSize, Data);
-      }
-      goto Done;     
-    }
-    //
-    // Logic comes here to update variable.
-    // If the variable is marked valid and the same data has been passed in
-    // then return to the caller immediately.
-    //
-    if (DataSizeOfVariable (&VariableHeader) == DataSize) {
-      NextVariable = (AUTHENTICATED_VARIABLE_HEADER *)GetEndPointer (VariableGlobal->VolatileVariableBase, TRUE, VariableGlobal, Instance);
-      GetVariableDataPtr (Variable->CurrPtr, Variable->Volatile, VariableGlobal, Instance, (CHAR16 *) NextVariable);
-      if  (CompareMem (Data, (VOID *) NextVariable, DataSize) == 0) {
-        UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE);
-        Status = EFI_SUCCESS;
-        goto Done;
-      }
-    }
-    if ((VariableHeader.State == VAR_ADDED) ||
-        (VariableHeader.State == (VAR_ADDED & VAR_IN_DELETED_TRANSITION))) {
-      //
-      // If new data is different from the old one, mark the old one as VAR_IN_DELETED_TRANSITION.
-      // It will be deleted if new variable is successfully written.
-      //
-      State = VariableHeader.State;
-      State &= VAR_IN_DELETED_TRANSITION;
-
-      Status = AccessVariableStore (
-                 TRUE,
-                 VariableGlobal,
-                 Variable->Volatile,
-                 Instance,
-                 (UINTN) &(((AUTHENTICATED_VARIABLE_HEADER *)Variable->CurrPtr)->State),
-                 sizeof (UINT8),
-                 &State
-                 );      
-      if (EFI_ERROR (Status)) {
-        goto Done;  
-      }
-    }    
-  } else {
-    //
-    // Create a new variable
-    //  
-    
-    //
-    // Make sure we are trying to create a new variable.
-    // Setting a data variable with no access, or zero DataSize attributes means to delete it.    
-    //
-    if (DataSize == 0 || (Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == 0) {
-      Status = EFI_NOT_FOUND;
-      goto Done;
-    }
-    
-    //
-    // Only variable have NV|RT attribute can be created in Runtime
-    //
-    if (EfiAtRuntime () &&
-        (((Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0) || ((Attributes & EFI_VARIABLE_NON_VOLATILE) == 0))) {
-      Status = EFI_INVALID_PARAMETER;
-      goto Done;
-    }         
-  }
-
-  //
-  // Function part - create a new variable and copy the data.
-  // Both update a variable and create a variable will come here.
-  //
-  // Tricky part: Use scratch data area at the end of volatile variable store
-  // as a temporary storage.
-  //
-  NextVariable = (AUTHENTICATED_VARIABLE_HEADER *)GetEndPointer (VariableGlobal->VolatileVariableBase, TRUE, VariableGlobal, Instance);
-  ScratchSize = MAX (PcdGet32 (PcdMaxVariableSize), PcdGet32 (PcdMaxHardwareErrorVariableSize));
-  NextVariableHeader = (AUTHENTICATED_VARIABLE_HEADER *) NextVariable;
-
-  SetMem (NextVariableHeader, ScratchSize, 0xff);
-
-  NextVariableHeader->StartId         = VARIABLE_DATA;
-  NextVariableHeader->Attributes      = Attributes;
-  NextVariableHeader->PubKeyIndex     = KeyIndex;
-  NextVariableHeader->MonotonicCount  = MonotonicCount;
-  NextVariableHeader->Reserved        = 0;
-  VarNameOffset                       = sizeof (AUTHENTICATED_VARIABLE_HEADER);
-  VarNameSize                         = StrSize (VariableName);
-  CopyMem (
-    (UINT8 *) ((UINTN)NextVariable + VarNameOffset),
-    VariableName,
-    VarNameSize
-    );
-  VarDataOffset = VarNameOffset + VarNameSize + GET_PAD_SIZE (VarNameSize);
-  CopyMem (
-    (UINT8 *) ((UINTN)NextVariable + VarDataOffset),
-    Data,
-    DataSize
-    );
-  CopyMem (&NextVariableHeader->VendorGuid, VendorGuid, sizeof (EFI_GUID));
-  //
-  // There will be pad bytes after Data, the NextVariable->NameSize and
-  // NextVariable->DataSize should not include pad size so that variable
-  // service can get actual size in GetVariable.
-  //
-  NextVariableHeader->NameSize  = (UINT32)VarNameSize;
-  NextVariableHeader->DataSize  = (UINT32)DataSize;
-
-  //
-  // The actual size of the variable that stores in storage should
-  // include pad size.
-  //
-  VarSize = VarDataOffset + DataSize + GET_PAD_SIZE (DataSize);
-  if ((Attributes & EFI_VARIABLE_NON_VOLATILE) != 0) {
-    //
-    // Create a nonvolatile variable
-    //
-    Volatile = FALSE;
-    
-    GetVarStoreHeader (VariableGlobal->NonVolatileVariableBase, FALSE, VariableGlobal, Instance, &VariableStoreHeader);
-    if ((((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) 
-             && ((HEADER_ALIGN (VarSize) + Global->HwErrVariableTotalSize) > PcdGet32(PcdHwErrStorageSize)))
-             || (((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == 0) 
-             && ((HEADER_ALIGN (VarSize) + Global->CommonVariableTotalSize) > VariableStoreHeader.Size - sizeof (VARIABLE_STORE_HEADER) - PcdGet32(PcdHwErrStorageSize)))) {
-      if (EfiAtRuntime ()) {
-        Status = EFI_OUT_OF_RESOURCES;
-        goto Done;
-      }
-      //
-      // Perform garbage collection & reclaim operation
-      //
-      Status = Reclaim (VariableGlobal->NonVolatileVariableBase, &(Global->NonVolatileLastVariableOffset), FALSE, VirtualMode, Global, Variable->CurrPtr);
-      if (EFI_ERROR (Status)) {
-        goto Done;
-      }
-
-      Reclaimed = TRUE;
-      //
-      // If still no enough space, return out of resources
-      //
-      if ((((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) 
-               && ((HEADER_ALIGN (VarSize) + Global->HwErrVariableTotalSize) > PcdGet32(PcdHwErrStorageSize)))
-               || (((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == 0) 
-               && ((HEADER_ALIGN (VarSize) + Global->CommonVariableTotalSize) > VariableStoreHeader.Size - sizeof (VARIABLE_STORE_HEADER) - PcdGet32(PcdHwErrStorageSize)))) {
-        Status = EFI_OUT_OF_RESOURCES;
-        goto Done;
-      }
-    }
-    //
-    // Four steps
-    // 1. Write variable header
-    // 2. Set variable state to header valid  
-    // 3. Write variable data
-    // 4. Set variable state to valid
-    //
-    //
-    // Step 1:
-    //
-    Status = AccessVariableStore (
-               TRUE,
-               VariableGlobal,
-               FALSE,
-               Instance,
-               VariableGlobal->NonVolatileVariableBase + Global->NonVolatileLastVariableOffset,
-               sizeof (AUTHENTICATED_VARIABLE_HEADER),
-               (UINT8 *) NextVariable
-               );
-
-    if (EFI_ERROR (Status)) {
-      goto Done;
-    }
-
-    //
-    // Step 2:
-    //
-    NextVariableHeader->State = VAR_HEADER_VALID_ONLY;
-    Status = AccessVariableStore (
-               TRUE,
-               VariableGlobal,
-               FALSE,
-               Instance,
-               VariableGlobal->NonVolatileVariableBase + Global->NonVolatileLastVariableOffset,
-               sizeof (AUTHENTICATED_VARIABLE_HEADER),
-               (UINT8 *) NextVariable
-               );
-
-    if (EFI_ERROR (Status)) {
-      goto Done;
-    }
-    //
-    // Step 3:
-    //
-    Status = AccessVariableStore (
-               TRUE,
-               VariableGlobal,
-               FALSE,
-               Instance,
-               VariableGlobal->NonVolatileVariableBase + Global->NonVolatileLastVariableOffset + sizeof (AUTHENTICATED_VARIABLE_HEADER),
-               (UINT32) VarSize - sizeof (AUTHENTICATED_VARIABLE_HEADER),
-               (UINT8 *) NextVariable + sizeof (AUTHENTICATED_VARIABLE_HEADER)
-               );
-
-    if (EFI_ERROR (Status)) {
-      goto Done;
-    }
-    //
-    // Step 4:
-    //
-    NextVariableHeader->State = VAR_ADDED;
-    Status = AccessVariableStore (
-               TRUE,
-               VariableGlobal,
-               FALSE,
-               Instance,
-               VariableGlobal->NonVolatileVariableBase + Global->NonVolatileLastVariableOffset,
-               sizeof (AUTHENTICATED_VARIABLE_HEADER),
-               (UINT8 *) NextVariable
-               );
-
-    if (EFI_ERROR (Status)) {
-      goto Done;
-    }
-
-    Global->NonVolatileLastVariableOffset += HEADER_ALIGN (VarSize);
-
-    if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) != 0) {
-      Global->HwErrVariableTotalSize += HEADER_ALIGN (VarSize);
-    } else {
-      Global->CommonVariableTotalSize += HEADER_ALIGN (VarSize);
-    }
-  } else {
-    //
-    // Create a volatile variable
-    //      
-    Volatile = TRUE;
-
-    if ((UINT32) (HEADER_ALIGN(VarSize) + Global->VolatileLastVariableOffset) >
-        ((VARIABLE_STORE_HEADER *) ((UINTN) (VariableGlobal->VolatileVariableBase)))->Size) {
-      //
-      // Perform garbage collection & reclaim operation
-      //
-      Status = Reclaim (VariableGlobal->VolatileVariableBase, &Global->VolatileLastVariableOffset, TRUE, VirtualMode, Global, Variable->CurrPtr);
-      if (EFI_ERROR (Status)) {
-        goto Done;
-      }
-      //
-      // If still no enough space, return out of resources
-      //
-      if ((UINT32) (HEADER_ALIGN (VarSize) + Global->VolatileLastVariableOffset) >
-            ((VARIABLE_STORE_HEADER *) ((UINTN) (VariableGlobal->VolatileVariableBase)))->Size
-            ) {
-        Status = EFI_OUT_OF_RESOURCES;
-        goto Done;
-      }
-      Reclaimed = TRUE;
-    }
-
-    NextVariableHeader->State = VAR_ADDED;
-    Status = AccessVariableStore (
-               TRUE,
-               VariableGlobal,
-               TRUE,
-               Instance,
-               VariableGlobal->VolatileVariableBase + Global->VolatileLastVariableOffset,
-               (UINT32) VarSize,
-               (UINT8 *) NextVariable
-               );
-
-    if (EFI_ERROR (Status)) {
-      goto Done;
-    }
-
-    Global->VolatileLastVariableOffset += HEADER_ALIGN (VarSize);
-  }
-  //
-  // Mark the old variable as deleted
-  // If storage has just been reclaimed, the old variable marked as VAR_IN_DELETED_TRANSITION
-  // has already been eliminated, so no need to delete it.
-  //
-  if (!Reclaimed && !EFI_ERROR (Status) && Variable->CurrPtr != 0) {
-    State = ((AUTHENTICATED_VARIABLE_HEADER *)Variable->CurrPtr)->State;
-    State &= VAR_DELETED;
-
-    Status = AccessVariableStore (
-               TRUE,
-               VariableGlobal,
-               Variable->Volatile,
-               Instance,
-               (UINTN) &(((AUTHENTICATED_VARIABLE_HEADER *)Variable->CurrPtr)->State),
-               sizeof (UINT8),
-               &State
-               );
-  }
-
-  if (!EFI_ERROR (Status)) {
-    UpdateVariableInfo (VariableName, VendorGuid, Volatile, FALSE, TRUE, FALSE, FALSE);
-    UpdateVariableCache (VariableName, VendorGuid, Attributes, DataSize, Data);
-  }
-
-Done:
-  return Status;
-}
-
-/**
-  Implements EsalGetVariable function of Extended SAL Variable Services Class.
-
-  This function implements EsalGetVariable function of Extended SAL Variable Services Class.
-  It is equivalent in functionality to the EFI Runtime Service GetVariable().
-  
-  @param[in]      VariableName    A Null-terminated Unicode string that is the name of
-                                  the vendor's variable.
-  @param[in]      VendorGuid      A unique identifier for the vendor.
-  @param[out]     Attributes      If not NULL, a pointer to the memory location to return the 
-                                  attributes bitmask for the variable.
-  @param[in, out] DataSize        Size of Data found. If size is less than the
-                                  data, this value contains the required size.
-  @param[out]     Data            On input, the size in bytes of the return Data buffer.  
-                                  On output, the size of data returned in Data.
-  @param[in]      VirtualMode     Current calling mode for this function.
-  @param[in]      Global          Context of this Extended SAL Variable Services Class call.
-
-  @retval EFI_SUCCESS            The function completed successfully. 
-  @retval EFI_NOT_FOUND          The variable was not found.
-  @retval EFI_BUFFER_TOO_SMALL   DataSize is too small for the result.  DataSize has 
-                                 been updated with the size needed to complete the request.
-  @retval EFI_INVALID_PARAMETER  VariableName is NULL.
-  @retval EFI_INVALID_PARAMETER  VendorGuid is NULL.
-  @retval EFI_INVALID_PARAMETER  DataSize is NULL.
-  @retval EFI_INVALID_PARAMETER  DataSize is not too small and Data is NULL.
-  @retval EFI_DEVICE_ERROR       The variable could not be retrieved due to a hardware error.
-  @retval EFI_SECURITY_VIOLATION The variable could not be retrieved due to an authentication failure.
-
-**/
-EFI_STATUS
-EFIAPI
-EsalGetVariable (
-  IN      CHAR16                *VariableName,
-  IN      EFI_GUID              *VendorGuid,
-  OUT     UINT32                *Attributes OPTIONAL,
-  IN OUT  UINTN                 *DataSize,
-  OUT     VOID                  *Data,
-  IN      BOOLEAN               VirtualMode,
-  IN      ESAL_VARIABLE_GLOBAL  *Global
-  )
-{
-  VARIABLE_POINTER_TRACK            Variable;
-  UINTN                             VarDataSize;
-  EFI_STATUS                        Status;
-  AUTHENTICATED_VARIABLE_HEADER     VariableHeader;
-  BOOLEAN                           Valid;
-  VARIABLE_GLOBAL                   *VariableGlobal;
-  UINT32                            Instance;
-
-  if (VariableName == NULL || VendorGuid == NULL || DataSize == NULL) {
-    return EFI_INVALID_PARAMETER;
-  }
-
-  VariableGlobal = &Global->VariableGlobal[VirtualMode];
-  Instance = Global->FvbInstance;
-
-  AcquireLockOnlyAtBootTime(&VariableGlobal->VariableServicesLock);
-
-  //
-  // Check if this variable exists in cache.
-  //
-  Status = FindVariableInCache (VariableName, VendorGuid, Attributes, DataSize, Data);
-  if ((Status == EFI_BUFFER_TOO_SMALL) || (Status == EFI_SUCCESS)){
-    //
-    // If variable exists in cache, just update statistical information for it and finish.
-    // Here UpdateVariableInfo() has already retrieved data & attributes for output.
-    //
-    UpdateVariableInfo (VariableName, VendorGuid, FALSE, TRUE, FALSE, FALSE, TRUE);
-    goto Done;
-  }
-  //
-  // If variable does not exist in cache, search for it in variable storage area.
-  //
-  Status = FindVariable (VariableName, VendorGuid, &Variable, VariableGlobal, Instance);
-  if (Variable.CurrPtr == 0x0 || EFI_ERROR (Status)) {
-    //
-    // If it cannot be found in variable storage area, goto Done.
-    //
-    goto Done;
-  }
-
-  Valid = IsValidVariableHeader (Variable.CurrPtr, Variable.Volatile, VariableGlobal, Instance, &VariableHeader);
-  if (!Valid) {
-    Status = EFI_NOT_FOUND;
-    goto Done;
-  }
-  //
-  // If variable exists, but not in cache, get its data and attributes, update
-  // statistical information, and update cache.
-  //
-  VarDataSize = DataSizeOfVariable (&VariableHeader);
-  ASSERT (VarDataSize != 0);
-
-  if (*DataSize >= VarDataSize) {
-    if (Data == NULL) {
-      Status = EFI_INVALID_PARAMETER;
-      goto Done;
-    }
-
-    GetVariableDataPtr (
-      Variable.CurrPtr,
-      Variable.Volatile,
-      VariableGlobal,
-      Instance,
-      Data
-      );
-    if (Attributes != NULL) {
-      *Attributes = VariableHeader.Attributes;
-    }
-
-    *DataSize = VarDataSize;
-    UpdateVariableInfo (VariableName, VendorGuid, Variable.Volatile, TRUE, FALSE, FALSE, FALSE);
-    UpdateVariableCache (VariableName, VendorGuid, VariableHeader.Attributes, VarDataSize, Data);
- 
-    Status = EFI_SUCCESS;
-    goto Done;
-  } else {
-    //
-    // If DataSize is too small for the result, return EFI_BUFFER_TOO_SMALL.
-    //
-    *DataSize = VarDataSize;
-    Status = EFI_BUFFER_TOO_SMALL;
-    goto Done;
-  }
-
-Done:
-  ReleaseLockOnlyAtBootTime (&VariableGlobal->VariableServicesLock);
-  return Status;
-}
-
-/**
-  Implements EsalGetNextVariableName function of Extended SAL Variable Services Class.
-
-  This function implements EsalGetNextVariableName function of Extended SAL Variable Services Class.
-  It is equivalent in functionality to the EFI Runtime Service GetNextVariableName().
-  
-  @param[in, out] VariableNameSize Size of the variable
-  @param[in, out] VariableName     On input, supplies the last VariableName that was returned by GetNextVariableName().
-                                   On output, returns the Null-terminated Unicode string of the current variable.
-  @param[in, out] VendorGuid       On input, supplies the last VendorGuid that was returned by GetNextVariableName().
-                                   On output, returns the VendorGuid of the current variable.  
-  @param[in]      VirtualMode      Current calling mode for this function.
-  @param[in]      Global           Context of this Extended SAL Variable Services Class call.
-
-  @retval EFI_SUCCESS             The function completed successfully. 
-  @retval EFI_NOT_FOUND           The next variable was not found.
-  @retval EFI_BUFFER_TOO_SMALL    VariableNameSize is too small for the result. 
-                                  VariableNameSize has been updated with the size needed to complete the request.
-  @retval EFI_INVALID_PARAMETER   VariableNameSize is NULL.
-  @retval EFI_INVALID_PARAMETER   VariableName is NULL.
-  @retval EFI_INVALID_PARAMETER   VendorGuid is NULL.
-  @retval EFI_DEVICE_ERROR        The variable name could not be retrieved due to a hardware error.
-
-**/
-EFI_STATUS
-EFIAPI
-EsalGetNextVariableName (
-  IN OUT  UINTN                 *VariableNameSize,
-  IN OUT  CHAR16                *VariableName,
-  IN OUT  EFI_GUID              *VendorGuid,
-  IN      BOOLEAN               VirtualMode,
-  IN      ESAL_VARIABLE_GLOBAL  *Global
-  )
-{
-  VARIABLE_POINTER_TRACK            Variable;
-  UINTN                             VarNameSize;
-  EFI_STATUS                        Status;
-  AUTHENTICATED_VARIABLE_HEADER     VariableHeader;
-  VARIABLE_GLOBAL                   *VariableGlobal;
-  UINT32                            Instance;
-
-  if (VariableNameSize == NULL || VariableName == NULL || VendorGuid == NULL) {
-    return EFI_INVALID_PARAMETER;
-  }
-
-  VariableGlobal = &Global->VariableGlobal[VirtualMode];
-  Instance = Global->FvbInstance;
-
-  AcquireLockOnlyAtBootTime(&VariableGlobal->VariableServicesLock);
-
-  Status = FindVariable (VariableName, VendorGuid, &Variable, VariableGlobal, Instance);
-  //
-  // If the variable does not exist, goto Done and return.
-  //
-  if (Variable.CurrPtr == 0x0 || EFI_ERROR (Status)) {
-    goto Done;
-  }
-
-  if (VariableName[0] != 0) {
-    //
-    // If variable name is not NULL, get next variable
-    //
-    Variable.CurrPtr = GetNextVariablePtr (
-                         Variable.CurrPtr,
-                         Variable.Volatile,
-                         VariableGlobal,
-                         Instance
-                         );
-  }
-
-  while (TRUE) {
-    if (Variable.CurrPtr >= Variable.EndPtr || Variable.CurrPtr == 0x0) {
-      //
-      // If fail to find a variable in current area, reverse the volatile attribute of area to search.
-      //
-      Variable.Volatile = (BOOLEAN) (Variable.Volatile ^ ((BOOLEAN) 0x1));
-      //
-      // Here we depend on the searching sequence of FindVariable().
-      // It first searches volatile area, then NV area.
-      // So if the volatile attribute after switching is non-volatile, it means that we have finished searching volatile area,
-      // and EFI_NOT_FOUND is returnd.
-      // Otherwise, it means that we have finished searchig non-volatile area, and we will continue to search volatile area.
-      //
-      if (!Variable.Volatile) {
-        Variable.StartPtr = GetStartPointer (VariableGlobal->NonVolatileVariableBase);
-        Variable.EndPtr   = GetEndPointer (VariableGlobal->NonVolatileVariableBase, FALSE, VariableGlobal, Instance);
-      } else {
-        Status = EFI_NOT_FOUND;
-        goto Done;
-      }
-
-      Variable.CurrPtr = Variable.StartPtr;
-      if (!IsValidVariableHeader (Variable.CurrPtr, Variable.Volatile, VariableGlobal, Instance, NULL)) {
-        continue;
-      }
-    }
-    //
-    // Variable is found
-    //
-    if (IsValidVariableHeader (Variable.CurrPtr, Variable.Volatile, VariableGlobal, Instance, &VariableHeader)) {
-      if ((VariableHeader.State == VAR_ADDED) &&
-          (!(EfiAtRuntime () && ((VariableHeader.Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0)))) {
-        VarNameSize = NameSizeOfVariable (&VariableHeader);
-        ASSERT (VarNameSize != 0);
-
-        if (VarNameSize <= *VariableNameSize) {
-          GetVariableNamePtr (
-            Variable.CurrPtr,
-            Variable.Volatile,
-            VariableGlobal,
-            Instance,
-            VariableName
-            );
-          CopyMem (
-            VendorGuid,
-            &VariableHeader.VendorGuid,
-            sizeof (EFI_GUID)
-            );
-          Status = EFI_SUCCESS;
-        } else {
-          Status = EFI_BUFFER_TOO_SMALL;
-        }
-
-        *VariableNameSize = VarNameSize;
-        goto Done;
-      }
-    }
-
-    Variable.CurrPtr = GetNextVariablePtr (
-                         Variable.CurrPtr,
-                         Variable.Volatile,
-                         VariableGlobal,
-                         Instance
-                         );
-  }
-
-Done:
-  ReleaseLockOnlyAtBootTime (&VariableGlobal->VariableServicesLock);
-  return Status;
-}
-
-/**
-  Implements EsalSetVariable function of Extended SAL Variable Services Class.
-
-  This function implements EsalSetVariable function of Extended SAL Variable Services Class.
-  It is equivalent in functionality to the EFI Runtime Service SetVariable().
-  
-  @param[in]  VariableName       A Null-terminated Unicode string that is the name of the vendor's
-                                 variable.  Each VariableName is unique for each 
-                                 VendorGuid.  VariableName must contain 1 or more 
-                                 Unicode characters.  If VariableName is an empty Unicode 
-                                 string, then EFI_INVALID_PARAMETER is returned.
-  @param[in]  VendorGuid         A unique identifier for the vendor.
-  @param[in]  Attributes         Attributes bitmask to set for the variable.
-  @param[in]  DataSize           The size in bytes of the Data buffer.  A size of zero causes the
-                                 variable to be deleted.
-  @param[in]  Data               The contents for the variable.
-  @param[in]  VirtualMode        Current calling mode for this function.
-  @param[in]  Global             Context of this Extended SAL Variable Services Class call.
-
-  @retval EFI_SUCCESS            The firmware has successfully stored the variable and its data as 
-                                 defined by the Attributes.
-  @retval EFI_INVALID_PARAMETER  An invalid combination of attribute bits was supplied, or the 
-                                 DataSize exceeds the maximum allowed.
-  @retval EFI_INVALID_PARAMETER  VariableName is an empty Unicode string.
-  @retval EFI_OUT_OF_RESOURCES   Not enough storage is available to hold the variable and its data.
-  @retval EFI_DEVICE_ERROR       The variable could not be saved due to a hardware failure.
-  @retval EFI_WRITE_PROTECTED    The variable in question is read-only.
-  @retval EFI_WRITE_PROTECTED    The variable in question cannot be deleted.
-  @retval EFI_SECURITY_VIOLATION The variable could not be retrieved due to an authentication failure.
-  @retval EFI_NOT_FOUND          The variable trying to be updated or deleted was not found.
-
-**/
-EFI_STATUS
-EFIAPI
-EsalSetVariable (
-  IN CHAR16                  *VariableName,
-  IN EFI_GUID                *VendorGuid,
-  IN UINT32                  Attributes,
-  IN UINTN                   DataSize,
-  IN VOID                    *Data,
-  IN BOOLEAN                 VirtualMode,
-  IN ESAL_VARIABLE_GLOBAL    *Global
-  )
-{
-  VARIABLE_POINTER_TRACK  Variable;
-  EFI_STATUS              Status;
-  EFI_PHYSICAL_ADDRESS    NextVariable;
-  EFI_PHYSICAL_ADDRESS    Point;
-  VARIABLE_GLOBAL         *VariableGlobal;
-  UINT32                  Instance;
-  UINT32                  KeyIndex;
-  UINT64                  MonotonicCount;
-  UINTN                   PayloadSize;
-
-  //
-  // Check input parameters
-  //
-  if (VariableName == NULL || VariableName[0] == 0 || VendorGuid == NULL) {
-    return EFI_INVALID_PARAMETER;
-  }  
-
-  if (DataSize != 0 && Data == NULL) {
-    return EFI_INVALID_PARAMETER;
-  }
-
-  //
-  // EFI_VARIABLE_RUNTIME_ACCESS bit cannot be set without EFI_VARIABLE_BOOTSERVICE_ACCESS bit.
-  //
-  if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {
-    return EFI_INVALID_PARAMETER;
-  }
-
-  if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) == EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) {
-    if (DataSize < AUTHINFO_SIZE) {
-      //
-      // Try to write Authencated Variable without AuthInfo
-      //
-      return EFI_SECURITY_VIOLATION;
-    } 
-    PayloadSize = DataSize - AUTHINFO_SIZE; 
-  } else {
-    PayloadSize = DataSize; 
-  }
-
-  
-  if ((UINTN)(~0) - PayloadSize < StrSize(VariableName)){
-    //
-    // Prevent whole variable size overflow 
-    // 
-    return EFI_INVALID_PARAMETER;
-  }
-
-  VariableGlobal = &Global->VariableGlobal[VirtualMode];
-  Instance = Global->FvbInstance;
-
-  if ((Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
-    //
-    // For variable for hardware error record, the size of the VariableName, including the Unicode Null
-    // in bytes plus the DataSize is limited to maximum size of PcdGet32(PcdMaxHardwareErrorVariableSize) bytes.
-    //
-    if (StrSize (VariableName) + PayloadSize > PcdGet32(PcdMaxHardwareErrorVariableSize) - sizeof (AUTHENTICATED_VARIABLE_HEADER)) {
-      return EFI_INVALID_PARAMETER;
-    }
-    //
-    // According to UEFI spec, HARDWARE_ERROR_RECORD variable name convention should be L"HwErrRecXXXX"
-    //
-    if (StrnCmp (VariableName, \
-                 Global->VariableName[VirtualMode][VAR_HW_ERR_REC], \
-                 StrLen(Global->VariableName[VirtualMode][VAR_HW_ERR_REC])) != 0) {
-      return EFI_INVALID_PARAMETER;
-    }
-  } else {
-    //
-    // For variable not for hardware error record, the size of the VariableName, including the
-    // Unicode Null in bytes plus the DataSize is limited to maximum size of PcdGet32(PcdMaxVariableSize) bytes.
-    //
-    if (StrSize (VariableName) + PayloadSize > PcdGet32(PcdMaxVariableSize) - sizeof (AUTHENTICATED_VARIABLE_HEADER)) {
-      return EFI_INVALID_PARAMETER;
-    }  
-  }  
-
-  AcquireLockOnlyAtBootTime(&VariableGlobal->VariableServicesLock);
-
-  //
-  // Consider reentrant in MCA/INIT/NMI. It needs be reupdated;
-  //
-  if (InterlockedIncrement (&Global->ReentrantState) > 1) {
-    Point = VariableGlobal->NonVolatileVariableBase;;
-    //
-    // Parse non-volatile variable data and get last variable offset
-    //
-    NextVariable  = GetStartPointer (Point);
-    while (IsValidVariableHeader (NextVariable, FALSE, VariableGlobal, Instance, NULL)) {
-      NextVariable = GetNextVariablePtr (NextVariable, FALSE, VariableGlobal, Instance);
-    }
-    Global->NonVolatileLastVariableOffset = NextVariable - Point;
-  }
-
-  //
-  // Check whether the input variable exists
-  //
-
-  Status = FindVariable (VariableName, VendorGuid, &Variable, VariableGlobal, Instance);
-
-  //
-  // Hook the operation of setting PlatformLangCodes/PlatformLang and LangCodes/Lang
-  //
-  AutoUpdateLangVariable (VariableName, Data, PayloadSize, VirtualMode, Global);
-
-  //
-  // Process PK, KEK, Sigdb seperately
-  //
-  if (CompareGuid (VendorGuid, Global->GlobalVariableGuid[VirtualMode]) && (StrCmp (VariableName, Global->VariableName[VirtualMode][VAR_PLATFORM_KEY]) == 0)) {
-    Status = ProcessVarWithPk (VariableName, VendorGuid, Data, DataSize, VirtualMode, Global, &Variable, Attributes, TRUE);
-  } else if (CompareGuid (VendorGuid, Global->GlobalVariableGuid[VirtualMode]) && (StrCmp (VariableName, Global->VariableName[VirtualMode][VAR_KEY_EXCHANGE_KEY]) == 0)) {
-    Status = ProcessVarWithPk (VariableName, VendorGuid, Data, DataSize, VirtualMode, Global, &Variable, Attributes, FALSE);
-  } else if (CompareGuid (VendorGuid, Global->ImageSecurityDatabaseGuid[VirtualMode])) {
-    Status = ProcessVarWithKek (VariableName, VendorGuid, Data, DataSize, VirtualMode, Global, &Variable, Attributes);
-  } else {
-    Status = VerifyVariable (Data, DataSize, VirtualMode, Global, &Variable, Attributes, &KeyIndex, &MonotonicCount);
-    if (!EFI_ERROR(Status)) {
-      //
-      // Verification pass
-      //
-      if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) != 0) {
-        //
-        // Cut the certificate size before set
-        //
-        Status = UpdateVariable (
-                   VariableName, 
-                   VendorGuid, 
-                   (UINT8*)Data + AUTHINFO_SIZE, 
-                   DataSize - AUTHINFO_SIZE, 
-                   Attributes, 
-                   KeyIndex, 
-                   MonotonicCount, 
-                   VirtualMode, 
-                   Global, 
-                   &Variable
-                   );
-      } else {
-        //
-        // Update variable as usual 
-        //
-        Status = UpdateVariable (
-                   VariableName, 
-                   VendorGuid, 
-                   Data, 
-                   DataSize, 
-                   Attributes, 
-                   0, 
-                   0, 
-                   VirtualMode, 
-                   Global, 
-                   &Variable
-                   );
-      }
-    }
-  }
-
-  InterlockedDecrement (&Global->ReentrantState);
-  ReleaseLockOnlyAtBootTime (&VariableGlobal->VariableServicesLock);
-  return Status;
-}
-
-/**
-  Implements EsalQueryVariableInfo function of Extended SAL Variable Services Class.
-
-  This function implements EsalQueryVariableInfo function of Extended SAL Variable Services Class.
-  It is equivalent in functionality to the EFI Runtime Service QueryVariableInfo().
-
-  @param[in]  Attributes                   Attributes bitmask to specify the type of variables
-                                           on which to return information.
-  @param[out] MaximumVariableStorageSize   On output the maximum size of the storage space available for 
-                                           the EFI variables associated with the attributes specified.  
-  @param[out] RemainingVariableStorageSize Returns the remaining size of the storage space available for EFI 
-                                           variables associated with the attributes specified.
-  @param[out] MaximumVariableSize          Returns the maximum size of an individual EFI variable 
-                                           associated with the attributes specified.
-  @param[in]  VirtualMode                  Current calling mode for this function
-  @param[in]  Global                       Context of this Extended SAL Variable Services Class call
-
-  @retval EFI_SUCCESS                      Valid answer returned.
-  @retval EFI_INVALID_PARAMETER            An invalid combination of attribute bits was supplied.
-  @retval EFI_UNSUPPORTED                  The attribute is not supported on this platform, and the 
-                                           MaximumVariableStorageSize, RemainingVariableStorageSize, 
-                                           MaximumVariableSize are undefined.
-**/
-EFI_STATUS
-EFIAPI
-EsalQueryVariableInfo (
-  IN  UINT32                 Attributes,
-  OUT UINT64                 *MaximumVariableStorageSize,
-  OUT UINT64                 *RemainingVariableStorageSize,
-  OUT UINT64                 *MaximumVariableSize,
-  IN  BOOLEAN                VirtualMode,
-  IN  ESAL_VARIABLE_GLOBAL   *Global
-  )
-{
-  EFI_PHYSICAL_ADDRESS              Variable;
-  EFI_PHYSICAL_ADDRESS              NextVariable;
-  UINT64                            VariableSize;
-  EFI_PHYSICAL_ADDRESS              VariableStoreHeaderAddress;
-  BOOLEAN                           Volatile;
-  VARIABLE_STORE_HEADER             VarStoreHeader;
-  AUTHENTICATED_VARIABLE_HEADER     VariableHeader;
-  UINT64                            CommonVariableTotalSize;
-  UINT64                            HwErrVariableTotalSize;
-  VARIABLE_GLOBAL                   *VariableGlobal;
-  UINT32                            Instance;
-
-  CommonVariableTotalSize = 0;
-  HwErrVariableTotalSize = 0;
-
-  if(MaximumVariableStorageSize == NULL || RemainingVariableStorageSize == NULL || MaximumVariableSize == NULL || Attributes == 0) {
-    return EFI_INVALID_PARAMETER;
-  }
-  
-  if((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == 0) {
-    //
-    // Make sure the Attributes combination is supported by the platform.
-    //
-    return EFI_UNSUPPORTED;  
-  } else if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {
-    //
-    // Make sure if runtime bit is set, boot service bit is set also.
-    //
-    return EFI_INVALID_PARAMETER;
-  } else if (EfiAtRuntime () && ((Attributes & EFI_VARIABLE_RUNTIME_ACCESS) == 0)) {
-    //
-    // Make sure RT Attribute is set if we are in Runtime phase.
-    //
-    return EFI_INVALID_PARAMETER;
-  } else if ((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
-    //
-    // Make sure Hw Attribute is set with NV.
-    //
-    return EFI_INVALID_PARAMETER;
-  }
-
-  VariableGlobal = &Global->VariableGlobal[VirtualMode];
-  Instance = Global->FvbInstance;
-
-  AcquireLockOnlyAtBootTime(&VariableGlobal->VariableServicesLock);
-
-  if((Attributes & EFI_VARIABLE_NON_VOLATILE) == 0) {
-    //
-    // Query is Volatile related.
-    //
-    Volatile = TRUE;
-    VariableStoreHeaderAddress = VariableGlobal->VolatileVariableBase;
-  } else {
-    //
-    // Query is Non-Volatile related.
-    //
-    Volatile = FALSE;
-    VariableStoreHeaderAddress = VariableGlobal->NonVolatileVariableBase;
-  }
-
-  //
-  // Now let's fill *MaximumVariableStorageSize *RemainingVariableStorageSize
-  // with the storage size (excluding the storage header size).
-  //
-  GetVarStoreHeader (VariableStoreHeaderAddress, Volatile, VariableGlobal, Instance, &VarStoreHeader);
-
-  *MaximumVariableStorageSize   = VarStoreHeader.Size - sizeof (VARIABLE_STORE_HEADER);
-
-  // Harware error record variable needs larger size.
-  //
-  if ((Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
-    *MaximumVariableStorageSize = PcdGet32(PcdHwErrStorageSize);
-    *MaximumVariableSize = PcdGet32(PcdMaxHardwareErrorVariableSize) - sizeof (AUTHENTICATED_VARIABLE_HEADER);
-  } else {
-    if ((Attributes & EFI_VARIABLE_NON_VOLATILE) != 0) {
-      ASSERT (PcdGet32(PcdHwErrStorageSize) < VarStoreHeader.Size);
-      *MaximumVariableStorageSize = VarStoreHeader.Size - sizeof (VARIABLE_STORE_HEADER) - PcdGet32(PcdHwErrStorageSize);
-    }
-
-    //
-    // Let *MaximumVariableSize be PcdGet32(PcdMaxVariableSize) with the exception of the variable header size.
-    //
-    *MaximumVariableSize = PcdGet32(PcdMaxVariableSize) - sizeof (AUTHENTICATED_VARIABLE_HEADER);
-  }
-
-  //
-  // Point to the starting address of the variables.
-  //
-  Variable = GetStartPointer (VariableStoreHeaderAddress);
-
-  //
-  // Now walk through the related variable store.
-  //
-  while (IsValidVariableHeader (Variable, Volatile, VariableGlobal, Instance, &VariableHeader) &&
-         (Variable < GetEndPointer (VariableStoreHeaderAddress, Volatile, VariableGlobal, Instance))) {
-    NextVariable = GetNextVariablePtr (Variable, Volatile, VariableGlobal, Instance);
-    VariableSize = NextVariable - Variable;
-
-    if (EfiAtRuntime ()) {
-      //
-      // we don't take the state of the variables in mind
-      // when calculating RemainingVariableStorageSize,
-      // since the space occupied by variables not marked with
-      // VAR_ADDED is not allowed to be reclaimed in Runtime.
-      //
-      if ((VariableHeader.Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
-        HwErrVariableTotalSize += VariableSize;
-      } else {
-        CommonVariableTotalSize += VariableSize;
-      }
-    } else {
-      //
-      // Only care about Variables with State VAR_ADDED,because
-      // the space not marked as VAR_ADDED is reclaimable now.
-      //
-      if (VariableHeader.State == VAR_ADDED) {
-        if ((VariableHeader.Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD) {
-          HwErrVariableTotalSize += VariableSize;
-        } else {
-          CommonVariableTotalSize += VariableSize;
-        }
-      }
-    }
-
-    //
-    // Go to the next one
-    //
-    Variable = NextVariable;
-  }
-
-  if ((Attributes  & EFI_VARIABLE_HARDWARE_ERROR_RECORD) == EFI_VARIABLE_HARDWARE_ERROR_RECORD){
-    *RemainingVariableStorageSize = *MaximumVariableStorageSize - HwErrVariableTotalSize;
-  }else {
-    *RemainingVariableStorageSize = *MaximumVariableStorageSize - CommonVariableTotalSize;
-  }
-
-  if (*RemainingVariableStorageSize < sizeof (AUTHENTICATED_VARIABLE_HEADER)) {
-    *MaximumVariableSize = 0;
-  } else if ((*RemainingVariableStorageSize - sizeof (AUTHENTICATED_VARIABLE_HEADER)) < *MaximumVariableSize) {
-    *MaximumVariableSize = *RemainingVariableStorageSize - sizeof (AUTHENTICATED_VARIABLE_HEADER);
-  }
-
-  ReleaseLockOnlyAtBootTime (&VariableGlobal->VariableServicesLock);
-  return EFI_SUCCESS;
-}
-
-/**
-  Notification function of EVT_GROUP_READY_TO_BOOT event group.
-
-  This is a notification function registered on EVT_GROUP_READY_TO_BOOT event group.
-  When the Boot Manager is about to load and execute a boot option, it reclaims variable
-  storage if free size is below the threshold.
-
-  @param[in]  Event        Event whose notification function is being invoked.
-  @param[in]  Context      Pointer to the notification function's context.
-
-**/
-VOID
-EFIAPI
-ReclaimForOS(
-  IN EFI_EVENT  Event,
-  IN VOID       *Context
-  )
-{
-  UINT32                          VarSize;
-  EFI_STATUS                      Status;
-  UINTN                           CommonVariableSpace;
-  UINTN                           RemainingCommonVariableSpace;
-  UINTN                           RemainingHwErrVariableSpace;
-
-  VarSize = ((VARIABLE_STORE_HEADER *) ((UINTN) mVariableModuleGlobal->VariableGlobal[Physical].NonVolatileVariableBase))->Size;
-  Status  = EFI_SUCCESS; 
-  //
-  //Allowable max size of common variable storage space
-  //
-  CommonVariableSpace = VarSize - sizeof (VARIABLE_STORE_HEADER) - PcdGet32(PcdHwErrStorageSize);
-
-  RemainingCommonVariableSpace = CommonVariableSpace - mVariableModuleGlobal->CommonVariableTotalSize;
- 
-  RemainingHwErrVariableSpace = PcdGet32 (PcdHwErrStorageSize) - mVariableModuleGlobal->HwErrVariableTotalSize;
-  //
-  // If the free area is below a threshold, then performs reclaim operation.
-  //
-  if ((RemainingCommonVariableSpace < PcdGet32 (PcdMaxVariableSize))
-    || ((PcdGet32 (PcdHwErrStorageSize) != 0) && 
-       (RemainingHwErrVariableSpace < PcdGet32 (PcdMaxHardwareErrorVariableSize)))){
-    Status = Reclaim (
-               mVariableModuleGlobal->VariableGlobal[Physical].NonVolatileVariableBase,
-               &mVariableModuleGlobal->NonVolatileLastVariableOffset,
-               FALSE,
-               Physical,
-               mVariableModuleGlobal,
-               0x0
-               );
-    ASSERT_EFI_ERROR (Status);
-  }
-}
-
-/**
-  Flush the HOB variable to NV variable storage.
-**/
-VOID
-FlushHob2Nv (
-  VOID
-  )
-{
-  EFI_STATUS                      Status;
-  VOID                            *GuidHob;
-  VARIABLE_STORE_HEADER           *VariableStoreHeader;
-  AUTHENTICATED_VARIABLE_HEADER   *VariableHeader;
-  //
-  // Get HOB variable store.
-  //
-  GuidHob = GetFirstGuidHob (&gEfiAuthenticatedVariableGuid);
-  if (GuidHob != NULL) {
-    VariableStoreHeader = (VARIABLE_STORE_HEADER *) GET_GUID_HOB_DATA (GuidHob);
-    if (CompareGuid (&VariableStoreHeader->Signature, &gEfiAuthenticatedVariableGuid) &&
-        (VariableStoreHeader->Format == VARIABLE_STORE_FORMATTED) &&
-        (VariableStoreHeader->State == VARIABLE_STORE_HEALTHY)
-       ) {
-      DEBUG ((EFI_D_INFO, "HOB Variable Store appears to be valid.\n"));
-      //
-      // Flush the HOB variable to NV Variable storage.
-      //
-      for ( VariableHeader = (AUTHENTICATED_VARIABLE_HEADER *) HEADER_ALIGN (VariableStoreHeader + 1)
-          ; (VariableHeader < (AUTHENTICATED_VARIABLE_HEADER *) HEADER_ALIGN ((UINTN) VariableStoreHeader + VariableStoreHeader->Size)
-            &&
-            (VariableHeader->StartId == VARIABLE_DATA))
-          ; VariableHeader = (AUTHENTICATED_VARIABLE_HEADER *) HEADER_ALIGN ((UINTN) (VariableHeader + 1)
-                           + VariableHeader->NameSize + GET_PAD_SIZE (VariableHeader->NameSize)
-                           + VariableHeader->DataSize + GET_PAD_SIZE (VariableHeader->DataSize)
-                           )
-          ) {
-        ASSERT (VariableHeader->State == VAR_ADDED);
-        ASSERT ((VariableHeader->Attributes & EFI_VARIABLE_NON_VOLATILE) != 0);
-        Status = EsalSetVariable (
-                   (CHAR16 *) (VariableHeader + 1),
-                   &VariableHeader->VendorGuid,
-                   VariableHeader->Attributes,
-                   VariableHeader->DataSize,
-                   (UINT8 *) (VariableHeader + 1) + VariableHeader->NameSize + GET_PAD_SIZE (VariableHeader->NameSize),
-                   Physical,
-                   mVariableModuleGlobal
-                   );
-        ASSERT_EFI_ERROR (Status);
-      }
-    }
-  }
-}
-
-/**
-  Initializes variable store area for non-volatile and volatile variable.
-
-  This function allocates and initializes memory space for global context of ESAL
-  variable service and variable store area for non-volatile and volatile variable.
-
-  @param[in]  ImageHandle       The Image handle of this driver.
-  @param[in]  SystemTable       The pointer of EFI_SYSTEM_TABLE.
-
-  @retval EFI_SUCCESS           Function successfully executed.
-  @retval EFI_OUT_OF_RESOURCES  Fail to allocate enough memory resource.
-
-**/
-EFI_STATUS
-VariableCommonInitialize (
-  IN EFI_HANDLE         ImageHandle,
-  IN EFI_SYSTEM_TABLE   *SystemTable
-  )
-{
-  EFI_STATUS                      Status;
-  EFI_FIRMWARE_VOLUME_HEADER      *FwVolHeader;
-  EFI_PHYSICAL_ADDRESS            CurrPtr;
-  VARIABLE_STORE_HEADER           *VolatileVariableStore;
-  VARIABLE_STORE_HEADER           *VariableStoreHeader;
-  EFI_PHYSICAL_ADDRESS            Variable;
-  EFI_PHYSICAL_ADDRESS            NextVariable;
-  UINTN                           VariableSize;
-  UINT32                          Instance;
-  EFI_PHYSICAL_ADDRESS            FvVolHdr;
-  EFI_PHYSICAL_ADDRESS            TempVariableStoreHeader;
-  EFI_GCD_MEMORY_SPACE_DESCRIPTOR GcdDescriptor;
-  UINT64                          BaseAddress;
-  UINT64                          Length;
-  UINTN                           Index;
-  UINT8                           Data;
-  EFI_PHYSICAL_ADDRESS            VariableStoreBase;
-  UINT64                          VariableStoreLength;
-  EFI_EVENT                       ReadyToBootEvent;
-  UINTN                           ScratchSize;
-
-  //
-  // Allocate memory for mVariableModuleGlobal
-  //
-  mVariableModuleGlobal = AllocateRuntimeZeroPool (sizeof (ESAL_VARIABLE_GLOBAL));
-  if (mVariableModuleGlobal == NULL) {
-    return EFI_OUT_OF_RESOURCES;
-  }
-
-  mVariableModuleGlobal->GlobalVariableGuid[Physical] = &gEfiGlobalVariableGuid;
-  CopyMem (
-    mVariableModuleGlobal->VariableName[Physical],
-    mVariableName,
-    sizeof (mVariableName)
-    );
-
-  EfiInitializeLock(&mVariableModuleGlobal->VariableGlobal[Physical].VariableServicesLock, TPL_NOTIFY);
-
-  //
-  // Note that in EdkII variable driver implementation, Hardware Error Record type variable
-  // is stored with common variable in the same NV region. So the platform integrator should
-  // ensure that the value of PcdHwErrStorageSize is less than or equal to the value of 
-  // PcdFlashNvStorageVariableSize.
-  //
-  ASSERT (PcdGet32(PcdHwErrStorageSize) <= PcdGet32 (PcdFlashNvStorageVariableSize));
-
-  //
-  // Allocate memory for volatile variable store
-  //
-  ScratchSize = MAX (PcdGet32 (PcdMaxVariableSize), PcdGet32 (PcdMaxHardwareErrorVariableSize));
-  VolatileVariableStore = AllocateRuntimePool (PcdGet32 (PcdVariableStoreSize) + ScratchSize);
-  if (VolatileVariableStore == NULL) {
-    FreePool (mVariableModuleGlobal);
-    return EFI_OUT_OF_RESOURCES;
-  }
-
-  SetMem (VolatileVariableStore, PcdGet32 (PcdVariableStoreSize) + ScratchSize, 0xff);
-
-  //
-  // Variable Specific Data
-  //
-  mVariableModuleGlobal->VariableGlobal[Physical].VolatileVariableBase = (EFI_PHYSICAL_ADDRESS) (UINTN) VolatileVariableStore;
-  mVariableModuleGlobal->VolatileLastVariableOffset = (UINTN) GetStartPointer ((EFI_PHYSICAL_ADDRESS) VolatileVariableStore) - (UINTN) VolatileVariableStore;
-
-  CopyGuid (&VolatileVariableStore->Signature, &gEfiAuthenticatedVariableGuid);
-  VolatileVariableStore->Size                       = PcdGet32 (PcdVariableStoreSize);
-  VolatileVariableStore->Format                     = VARIABLE_STORE_FORMATTED;
-  VolatileVariableStore->State                      = VARIABLE_STORE_HEALTHY;
-  VolatileVariableStore->Reserved                   = 0;
-  VolatileVariableStore->Reserved1                  = 0;
-
-  //
-  // Get non volatile varaible store
-  //
-  TempVariableStoreHeader = (UINT64) PcdGet32 (PcdFlashNvStorageVariableBase);
-  VariableStoreBase = TempVariableStoreHeader + \
-                              (((EFI_FIRMWARE_VOLUME_HEADER *) (UINTN) (TempVariableStoreHeader)) -> HeaderLength);
-  VariableStoreLength = (UINT64) PcdGet32 (PcdFlashNvStorageVariableSize) - \
-                                (((EFI_FIRMWARE_VOLUME_HEADER *) (UINTN) (TempVariableStoreHeader)) -> HeaderLength);
-  //
-  // Mark the variable storage region of the FLASH as RUNTIME
-  //
-  BaseAddress = VariableStoreBase & (~EFI_PAGE_MASK);
-  Length      = VariableStoreLength + (VariableStoreBase - BaseAddress);
-  Length      = (Length + EFI_PAGE_SIZE - 1) & (~EFI_PAGE_MASK);
-
-  Status      = gDS->GetMemorySpaceDescriptor (BaseAddress, &GcdDescriptor);
-  if (EFI_ERROR (Status)) {
-    goto Done;
-  }
-
-  Status = gDS->SetMemorySpaceAttributes (
-                  BaseAddress,
-                  Length,
-                  GcdDescriptor.Attributes | EFI_MEMORY_RUNTIME
-                  );
-  if (EFI_ERROR (Status)) {
-    goto Done;
-  }
-  //
-  // Get address of non volatile variable store base.
-  //
-  mVariableModuleGlobal->VariableGlobal[Physical].NonVolatileVariableBase = VariableStoreBase;
-
-  //
-  // Check Integrity
-  //
-  //
-  // Find the Correct Instance of the FV Block Service.
-  //
-  Instance  = 0;
-  CurrPtr   = mVariableModuleGlobal->VariableGlobal[Physical].NonVolatileVariableBase;
-
-  do {
-    FvVolHdr = 0;
-    Status    = (EFI_STATUS) EsalCall (
-                               EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_LO,
-                               EFI_EXTENDED_SAL_FV_BLOCK_SERVICES_PROTOCOL_GUID_HI,
-                               GetPhysicalAddressFunctionId, 
-                               Instance, 
-                               (UINT64) &FvVolHdr, 
-                               0, 
-                               0, 
-                               0, 
-                               0, 
-                               0
-                               ).Status;
-    if (EFI_ERROR (Status)) {
-      break;
-    }
-    FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) ((UINTN) FvVolHdr);
-    ASSERT (FwVolHeader != NULL);
-    if (CurrPtr >= (EFI_PHYSICAL_ADDRESS) FwVolHeader &&
-        CurrPtr <  ((EFI_PHYSICAL_ADDRESS) FwVolHeader + FwVolHeader->FvLength)) {
-      mVariableModuleGlobal->FvbInstance = Instance;
-      break;
-    }
-
-    Instance++;
-  } while (Status == EFI_SUCCESS);
-
-  VariableStoreHeader = (VARIABLE_STORE_HEADER *) CurrPtr;
-  if (GetVariableStoreStatus (VariableStoreHeader) == EfiValid) {
-    if (~VariableStoreHeader->Size == 0) {
-      Status = AccessVariableStore (
-                 TRUE,
-                 &mVariableModuleGlobal->VariableGlobal[Physical],
-                 FALSE,
-                 mVariableModuleGlobal->FvbInstance,
-                 (UINTN) &VariableStoreHeader->Size,
-                 sizeof (UINT32),
-                 (UINT8 *) &VariableStoreLength
-                 );
-      //
-      // As Variables are stored in NV storage, which are slow devices,such as flash.
-      // Variable operation may skip checking variable program result to improve performance,
-      // We can assume Variable program is OK through some check point.
-      // Variable Store Size Setting should be the first Variable write operation,
-      // We can assume all Read/Write is OK if we can set Variable store size successfully.
-      // If write fail, we will assert here.
-      //
-      ASSERT(VariableStoreHeader->Size == VariableStoreLength);
-
-      if (EFI_ERROR (Status)) {
-        goto Done;
-      }
-    }
-
-    mVariableModuleGlobal->VariableGlobal[Physical].NonVolatileVariableBase = (EFI_PHYSICAL_ADDRESS) ((UINTN) CurrPtr);
-    //
-    // Parse non-volatile variable data and get last variable offset.
-    //
-    Variable = GetStartPointer (CurrPtr);
-    Status   = EFI_SUCCESS;
-
-    while (IsValidVariableHeader (Variable, FALSE, &(mVariableModuleGlobal->VariableGlobal[Physical]), Instance, NULL)) {
-      NextVariable = GetNextVariablePtr (
-                       Variable,
-                       FALSE,
-                       &(mVariableModuleGlobal->VariableGlobal[Physical]),
-                       Instance
-                       );
-      VariableSize = NextVariable - Variable;
-      if ((((AUTHENTICATED_VARIABLE_HEADER *)Variable)->Attributes & (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) == (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_HARDWARE_ERROR_RECORD)) {
-        mVariableModuleGlobal->HwErrVariableTotalSize += VariableSize;
-      } else {
-        mVariableModuleGlobal->CommonVariableTotalSize += VariableSize;
-      }
-
-      Variable = NextVariable;
-    }
-
-    mVariableModuleGlobal->NonVolatileLastVariableOffset = (UINTN) Variable - (UINTN) CurrPtr;
-
-    //
-    // Check if the free area is really free.
-    //
-    for (Index = mVariableModuleGlobal->NonVolatileLastVariableOffset; Index < VariableStoreHeader->Size; Index++) {
-      Data = ((UINT8 *) (UINTN) mVariableModuleGlobal->VariableGlobal[Physical].NonVolatileVariableBase)[Index];
-      if (Data != 0xff) {
-        //
-        // There must be something wrong in variable store, do reclaim operation.
-        //
-        Status = Reclaim (
-                   mVariableModuleGlobal->VariableGlobal[Physical].NonVolatileVariableBase,
-                   &mVariableModuleGlobal->NonVolatileLastVariableOffset,
-                   FALSE,
-                   Physical,
-                   mVariableModuleGlobal,
-                   0x0
-                   );
-        if (EFI_ERROR (Status)) {
-          goto Done;
-        }
-        break;
-      }
-    }
-
-    //
-    // Register the event handling function to reclaim variable for OS usage.
-    //
-    Status = EfiCreateEventReadyToBootEx (
-               TPL_NOTIFY, 
-               ReclaimForOS, 
-               NULL, 
-               &ReadyToBootEvent
-               );
-  } else {
-    Status = EFI_VOLUME_CORRUPTED;
-    DEBUG((EFI_D_ERROR, "Variable Store header is corrupted\n"));
-  }
-
-Done:
-  if (EFI_ERROR (Status)) {
-    FreePool (mVariableModuleGlobal);
-    FreePool (VolatileVariableStore);
-  }
-
-  return Status;
-}
diff --git a/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/Variable.h b/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/Variable.h
deleted file mode 100644
index b32ef741bf..0000000000
--- a/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/Variable.h
+++ /dev/null
@@ -1,505 +0,0 @@
-/** @file
-  Internal header file for Extended SAL variable service module.
-
-Copyright (c) 2009 - 2015, Intel Corporation. All rights reserved.<BR>
-This program and the accompanying materials 
-are licensed and made available under the terms and conditions of the BSD License 
-which accompanies this distribution.  The full text of the license may be found at 
-http://opensource.org/licenses/bsd-license.php
-
-THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, 
-WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
-
-**/
-
-#ifndef _VARIABLE_H_
-#define _VARIABLE_H_
-
-#include <PiDxe.h>
-
-#include <Protocol/VariableWrite.h>
-#include <Protocol/FaultTolerantWrite.h>
-#include <Protocol/FirmwareVolumeBlock.h>
-#include <Protocol/Variable.h>
-#include <Protocol/ExtendedSalBootService.h>
-#include <Protocol/ExtendedSalServiceClasses.h>
-
-#include <Guid/GlobalVariable.h>
-#include <Guid/AuthenticatedVariableFormat.h>
-#include <Guid/ImageAuthentication.h>
-#include <Guid/EventGroup.h>
-
-#include <Library/PcdLib.h>
-#include <Library/HobLib.h>
-#include <Library/UefiDriverEntryPoint.h>
-#include <Library/DxeServicesTableLib.h>
-#include <Library/UefiRuntimeLib.h>
-#include <Library/DebugLib.h>
-#include <Library/BaseMemoryLib.h>
-#include <Library/UefiBootServicesTableLib.h>
-#include <Library/UefiLib.h>
-#include <Library/BaseLib.h>
-#include <Library/SynchronizationLib.h>
-#include <Library/MemoryAllocationLib.h>
-#include <Library/ExtendedSalLib.h>
-#include <Library/BaseCryptLib.h>
-
-#define MAX_NAME_SIZE            0x100
-#define NUM_VAR_NAME             9  // Number of pre-defined variable name to be referenced
-#define VAR_PLATFORM_LANG_CODES  0  // Index of "PlatformLangCodes" variable
-#define VAR_LANG_CODES           1  // Index of "LangCodes" variable
-#define VAR_PLATFORM_LANG        2  // Index of "PlatformLang" variable
-#define VAR_LANG                 3  // Index of "Lang" variable
-#define VAR_HW_ERR_REC           4  // Index of "HwErrRecXXXX" variable
-#define VAR_AUTH_KEY_DB          5  // Index of "AuthVarKeyDatabase" variable
-#define VAR_SETUP_MODE           6  // Index of "SetupMode" variable
-#define VAR_PLATFORM_KEY         7  // Index of "PK" variable
-#define VAR_KEY_EXCHANGE_KEY     8  // Index of "KEK" variable
-
-///
-/// "AuthVarKeyDatabase" variable for the Public Key store.
-///
-#define AUTHVAR_KEYDB_NAME      L"AuthVarKeyDatabase"
-#define AUTHVAR_KEYDB_NAME_SIZE 38
-
-///
-/// The maximum size of the public key database, restricted by maximum individal EFI 
-/// varible size, and excluding the variable header and name size.
-///
-#define MAX_KEYDB_SIZE  (FixedPcdGet32 (PcdMaxVariableSize) - sizeof (AUTHENTICATED_VARIABLE_HEADER) - AUTHVAR_KEYDB_NAME_SIZE)
-#define MAX_KEY_NUM     (MAX_KEYDB_SIZE / EFI_CERT_TYPE_RSA2048_SIZE)
-
-///
-/// The size of a 3 character ISO639 language code.
-///
-#define ISO_639_2_ENTRY_SIZE    3
-
-typedef enum {
-  Physical,
-  Virtual
-} VARIABLE_POINTER_TYPE;
-
-typedef struct {
-  EFI_PHYSICAL_ADDRESS CurrPtr;
-  EFI_PHYSICAL_ADDRESS EndPtr;
-  EFI_PHYSICAL_ADDRESS StartPtr;
-  BOOLEAN              Volatile;
-} VARIABLE_POINTER_TRACK;
-
-typedef struct {
-  EFI_PHYSICAL_ADDRESS  VolatileVariableBase;
-  EFI_PHYSICAL_ADDRESS  NonVolatileVariableBase;
-  EFI_LOCK              VariableServicesLock;
-} VARIABLE_GLOBAL;
-
-typedef struct {
-  VARIABLE_GLOBAL VariableGlobal[2];
-  CHAR16          *VariableName[2][NUM_VAR_NAME];
-  EFI_GUID        *GlobalVariableGuid[2];
-  UINTN           VolatileLastVariableOffset;
-  UINTN           NonVolatileLastVariableOffset;
-  UINTN           CommonVariableTotalSize;
-  UINTN           HwErrVariableTotalSize;
-  CHAR8           *PlatformLangCodes[2];
-  CHAR8           *LangCodes[2];
-  CHAR8           *PlatformLang[2];
-  CHAR8           Lang[ISO_639_2_ENTRY_SIZE + 1];
-  UINT32          FvbInstance;
-  UINT32          ReentrantState;
-  EFI_GUID        *AuthenticatedVariableGuid[2];
-  EFI_GUID        *CertRsa2048Sha256Guid[2];
-  EFI_GUID        *ImageSecurityDatabaseGuid[2];
-  VOID            *HashContext[2];             // Hash context pointer
-  UINT8           KeyList[MAX_KEYDB_SIZE];     // Cached Platform Key list
-  UINT8           PubKeyStore[MAX_KEYDB_SIZE]; // Cached Public Key list
-} ESAL_VARIABLE_GLOBAL;
-
-typedef struct {
-  EFI_GUID    *Guid;
-  CHAR16      *Name;
-  UINT32      Attributes;
-  UINTN       DataSize;
-  VOID        *Data;
-} VARIABLE_CACHE_ENTRY;
-
-
-extern ESAL_VARIABLE_GLOBAL  *mVariableModuleGlobal;
-
-//
-// Functions
-//
-
-/**
-  Initializes variable store area for non-volatile and volatile variable.
-
-  This function allocates and initializes memory space for global context of ESAL
-  variable service and variable store area for non-volatile and volatile variable.
-
-  @param[in]  ImageHandle       The Image handle of this driver.
-  @param[in]  SystemTable       The pointer of EFI_SYSTEM_TABLE.
-
-  @retval EFI_SUCCESS           Function successfully executed.
-  @retval EFI_OUT_OF_RESOURCES  Failed to allocate enough memory resource.
-
-**/
-EFI_STATUS
-VariableCommonInitialize (
-  IN EFI_HANDLE         ImageHandle,
-  IN EFI_SYSTEM_TABLE   *SystemTable
-  );
-
-/**
-  Entry point of Extended SAL Variable service module.
-
-  This function is the entry point of Extended SAL Variable service module.
-  It registers all functions of Extended SAL Variable class, initializes
-  variable store for non-volatile and volatile variables, and registers
-  notification function for EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE event.
-
-  @param[in]  ImageHandle   The Image handle of this driver.
-  @param[in]  SystemTable   The pointer of EFI_SYSTEM_TABLE.
-
-  @retval     EFI_SUCCESS   Extended SAL Variable Services Class successfully registered.
-
-**/
-EFI_STATUS
-EFIAPI
-VariableServiceInitialize (
-  IN EFI_HANDLE         ImageHandle,
-  IN EFI_SYSTEM_TABLE   *SystemTable
-  );
-
-/**
-  Notification function of EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE.
-
-  This is a notification function registered on EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE event.
-  It convers pointer to new virtual address.
-
-  @param[in]  Event        The event whose notification function is being invoked.
-  @param[in]  Context      The pointer to the notification function's context.
-
-**/
-VOID
-EFIAPI
-VariableClassAddressChangeEvent (
-  IN EFI_EVENT        Event,
-  IN VOID             *Context
-  );
-
-/**
-  Implements EsalGetVariable function of Extended SAL Variable Services Class.
-
-  This function implements EsalGetVariable function of Extended SAL Variable Services Class.
-  It is equivalent in functionality to the EFI Runtime Service GetVariable().
-  
-  @param[in]      VariableName    A Null-terminated Unicode string that is the name of
-                                  the vendor's variable.
-  @param[in]      VendorGuid      A unique identifier for the vendor.
-  @param[out]     Attributes      If not NULL, a pointer to the memory location to return the 
-                                  attributes bitmask for the variable.
-  @param[in, out] DataSize        Size of Data found. If size is less than the
-                                  data, this value contains the required size.
-  @param[out]     Data            On input, the size in bytes of the return Data buffer.  
-                                  On output, the size of data returned in Data.
-  @param[in]      VirtualMode     Current calling mode for this function.
-  @param[in]      Global          Context of this Extended SAL Variable Services Class call.
-
-  @retval EFI_SUCCESS            The function completed successfully. 
-  @retval EFI_NOT_FOUND          The variable was not found.
-  @retval EFI_BUFFER_TOO_SMALL   DataSize is too small for the result.  DataSize has 
-                                 been updated with the size needed to complete the request.
-  @retval EFI_INVALID_PARAMETER  VariableName is NULL.
-  @retval EFI_INVALID_PARAMETER  VendorGuid is NULL.
-  @retval EFI_INVALID_PARAMETER  DataSize is NULL.
-  @retval EFI_INVALID_PARAMETER  DataSize is not too small and Data is NULL.
-  @retval EFI_DEVICE_ERROR       The variable could not be retrieved due to a hardware error.
-  @retval EFI_SECURITY_VIOLATION The variable could not be retrieved due to an authentication failure.
-
-**/
-EFI_STATUS
-EFIAPI
-EsalGetVariable (
-  IN      CHAR16                *VariableName,
-  IN      EFI_GUID              *VendorGuid,
-  OUT     UINT32                *Attributes OPTIONAL,
-  IN OUT  UINTN                 *DataSize,
-  OUT     VOID                  *Data,
-  IN      BOOLEAN               VirtualMode,
-  IN      ESAL_VARIABLE_GLOBAL  *Global
-  );
-
-/**
-  Implements EsalGetNextVariableName function of Extended SAL Variable Services Class.
-
-  This function implements EsalGetNextVariableName function of Extended SAL Variable Services Class.
-  It is equivalent in functionality to the EFI Runtime Service GetNextVariableName().
-  
-  @param[in, out] VariableNameSize Size of the variable
-  @param[in, out] VariableName     On input, supplies the last VariableName that was returned by GetNextVariableName().
-                                   On output, returns the Null-terminated Unicode string of the current variable.
-  @param[in, out] VendorGuid       On input, supplies the last VendorGuid that was returned by GetNextVariableName().
-                                   On output, returns the VendorGuid of the current variable.  
-  @param[in]      VirtualMode      Current calling mode for this function.
-  @param[in]      Global           Context of this Extended SAL Variable Services Class call.
-
-  @retval EFI_SUCCESS             The function completed successfully. 
-  @retval EFI_NOT_FOUND           The next variable was not found.
-  @retval EFI_BUFFER_TOO_SMALL    VariableNameSize is too small for the result. 
-                                  VariableNameSize has been updated with the size needed to complete the request.
-  @retval EFI_INVALID_PARAMETER   VariableNameSize is NULL.
-  @retval EFI_INVALID_PARAMETER   VariableName is NULL.
-  @retval EFI_INVALID_PARAMETER   VendorGuid is NULL.
-  @retval EFI_DEVICE_ERROR        The variable name could not be retrieved due to a hardware error.
-
-**/
-EFI_STATUS
-EFIAPI
-EsalGetNextVariableName (
-  IN OUT  UINTN                 *VariableNameSize,
-  IN OUT  CHAR16                *VariableName,
-  IN OUT  EFI_GUID              *VendorGuid,
-  IN      BOOLEAN               VirtualMode,
-  IN      ESAL_VARIABLE_GLOBAL  *Global
-  );
-
-/**
-  Implements EsalSetVariable function of Extended SAL Variable Services Class.
-
-  This function implements EsalSetVariable function of Extended SAL Variable Services Class.
-  It is equivalent in functionality to the EFI Runtime Service SetVariable().
-  
-  @param[in]  VariableName       A Null-terminated Unicode string that is the name of the vendor's
-                                 variable.  Each VariableName is unique for each 
-                                 VendorGuid.  VariableName must contain 1 or more 
-                                 Unicode characters.  If VariableName is an empty Unicode 
-                                 string, then EFI_INVALID_PARAMETER is returned.
-  @param[in]  VendorGuid         A unique identifier for the vendor.
-  @param[in]  Attributes         Attributes bitmask to set for the variable.
-  @param[in]  DataSize           The size in bytes of the Data buffer.  A size of zero causes the
-                                 variable to be deleted.
-  @param[in]  Data               The contents for the variable.
-  @param[in]  VirtualMode        Current calling mode for this function.
-  @param[in]  Global             Context of this Extended SAL Variable Services Class call.
-
-  @retval EFI_SUCCESS            The firmware has successfully stored the variable and its data as 
-                                 defined by the Attributes.
-  @retval EFI_INVALID_PARAMETER  An invalid combination of attribute bits was supplied, or the 
-                                 DataSize exceeds the maximum allowed.
-  @retval EFI_INVALID_PARAMETER  VariableName is an empty Unicode string.
-  @retval EFI_OUT_OF_RESOURCES   Not enough storage is available to hold the variable and its data.
-  @retval EFI_DEVICE_ERROR       The variable could not be saved due to a hardware failure.
-  @retval EFI_WRITE_PROTECTED    The variable in question is read-only.
-  @retval EFI_WRITE_PROTECTED    The variable in question cannot be deleted.
-  @retval EFI_SECURITY_VIOLATION The variable could not be retrieved due to an authentication failure.
-  @retval EFI_NOT_FOUND          The variable trying to be updated or deleted was not found.
-
-**/
-EFI_STATUS
-EFIAPI
-EsalSetVariable (
-  IN CHAR16                  *VariableName,
-  IN EFI_GUID                *VendorGuid,
-  IN UINT32                  Attributes,
-  IN UINTN                   DataSize,
-  IN VOID                    *Data,
-  IN BOOLEAN                 VirtualMode,
-  IN ESAL_VARIABLE_GLOBAL    *Global
-  );
-
-/**
-  Implements EsalQueryVariableInfo function of Extended SAL Variable Services Class.
-
-  This function implements EsalQueryVariableInfo function of Extended SAL Variable Services Class.
-  It is equivalent in functionality to the EFI Runtime Service QueryVariableInfo().
-
-  @param[in]  Attributes                   Attributes bitmask to specify the type of variables
-                                           on which to return information.
-  @param[out] MaximumVariableStorageSize   On output the maximum size of the storage space available for 
-                                           the EFI variables associated with the attributes specified.  
-  @param[out] RemainingVariableStorageSize Returns the remaining size of the storage space available for EFI 
-                                           variables associated with the attributes specified.
-  @param[out] MaximumVariableSize          Returns the maximum size of an individual EFI variable 
-                                           associated with the attributes specified.
-  @param[in]  VirtualMode                  Current calling mode for this function
-  @param[in]  Global                       Context of this Extended SAL Variable Services Class call
-
-  @retval EFI_SUCCESS                      Valid answer returned.
-  @retval EFI_INVALID_PARAMETER            An invalid combination of attribute bits was supplied.
-  @retval EFI_UNSUPPORTED                  The attribute is not supported on this platform, and the 
-                                           MaximumVariableStorageSize, RemainingVariableStorageSize, 
-                                           MaximumVariableSize are undefined.
-**/
-EFI_STATUS
-EFIAPI
-EsalQueryVariableInfo (
-  IN  UINT32                 Attributes,
-  OUT UINT64                 *MaximumVariableStorageSize,
-  OUT UINT64                 *RemainingVariableStorageSize,
-  OUT UINT64                 *MaximumVariableSize,
-  IN  BOOLEAN                VirtualMode,
-  IN  ESAL_VARIABLE_GLOBAL   *Global
-  );
-
-/**
-  Writes a buffer to variable storage space.
-
-  This function writes a buffer to variable storage space into firmware
-  volume block device. The destination is specified by parameter
-  VariableBase. Fault Tolerant Write protocol is used for writing.
-
-  @param[in] VariableBase The base address of the variable to write.
-  @param[in] Buffer       Points to the data buffer.
-  @param[in] BufferSize   The number of bytes of the data Buffer.
-
-  @retval EFI_SUCCESS     The function completed successfully.
-  @retval EFI_NOT_FOUND   Fail to locate Fault Tolerant Write protocol.
-  @retval Other           The function could not complete successfully.
-
-**/
-EFI_STATUS
-FtwVariableSpace (
-  IN EFI_PHYSICAL_ADDRESS   VariableBase,
-  IN UINT8                  *Buffer,
-  IN UINTN                  BufferSize
-  );
-
-/**
-  Finds variable in volatile and non-volatile storage areas.
-
-  This code finds variable in volatile and non-volatile storage areas.
-  If VariableName is an empty string, then we just return the first
-  qualified variable without comparing VariableName and VendorGuid.
-  Otherwise, VariableName and VendorGuid are compared.
-
-  @param[in]  VariableName            Name of the variable to be found.
-  @param[in]  VendorGuid              Vendor GUID to be found.
-  @param[out] PtrTrack                VARIABLE_POINTER_TRACK structure for output,
-                                      including the range searched and the target position.
-  @param[in]  Global                  Pointer to VARIABLE_GLOBAL structure, including
-                                      base of volatile variable storage area, base of
-                                      NV variable storage area, and a lock.
-  @param[in]  Instance                Instance of FV Block services.
-
-  @retval EFI_INVALID_PARAMETER       If VariableName is not an empty string, while
-                                      VendorGuid is NULL.
-  @retval EFI_SUCCESS                 Variable successfully found.
-  @retval EFI_INVALID_PARAMETER       Variable not found.
-
-**/
-EFI_STATUS
-FindVariable (
-  IN  CHAR16                  *VariableName,
-  IN  EFI_GUID                *VendorGuid,
-  OUT VARIABLE_POINTER_TRACK  *PtrTrack,
-  IN  VARIABLE_GLOBAL         *Global,
-  IN  UINTN                   Instance
-  );
-
-/**
-  Gets the pointer to variable data area.
-
-  This function gets the pointer to variable data area.
-  The variable is specified by its variable header.
-
-  @param[in]  VariableAddress    Start address of variable header.
-  @param[in]  Volatile           TRUE  - Variable is volatile.
-                                 FALSE - Variable is non-volatile.
-  @param[in]  Global             Pointer to VARAIBLE_GLOBAL structure.
-  @param[in]  Instance           Instance of FV Block services.
-  @param[out] VariableData       Buffer to hold variable data for output.
-
-**/
-VOID
-GetVariableDataPtr (
-  IN  EFI_PHYSICAL_ADDRESS   VariableAddress,
-  IN  BOOLEAN                Volatile,
-  IN  VARIABLE_GLOBAL        *Global,
-  IN  UINTN                  Instance,
-  OUT CHAR16                 *VariableData
-  );
-
-/**
-  Gets the size of variable data area.
-
-  This function gets the size of variable data area.
-  The variable is specified by its variable header.
-  If variable header contains raw data, just return 0.
-
-  @param[in]  Variable  Pointer to the variable header.
-
-  @return               Size of variable data area in bytes.
-
-**/
-UINTN
-DataSizeOfVariable (
-  IN  AUTHENTICATED_VARIABLE_HEADER     *Variable
-  );
-
-/**
-  Update the variable region with Variable information. These are the same 
-  arguments as the EFI Variable services.
-
-  @param[in] VariableName       Name of variable.
-  @param[in] VendorGuid         Guid of variable.
-  @param[in] Data               Variable data.
-  @param[in] DataSize           Size of data. 0 means delete.
-  @param[in] Attributes         Attributes of the variable.
-  @param[in] KeyIndex           Index of associated public key.
-  @param[in] MonotonicCount     Value of associated monotonic count. 
-  @param[in] VirtualMode        Current calling mode for this function.
-  @param[in] Global             Context of this Extended SAL Variable Services Class call.
-  @param[in] Variable           The variable information which is used to keep track of variable usage.
-
-  @retval EFI_SUCCESS           The update operation is success.
-  @retval EFI_OUT_OF_RESOURCES  Variable region is full, can not write other data into this region.
-
-**/
-EFI_STATUS
-EFIAPI
-UpdateVariable (
-  IN      CHAR16                  *VariableName,
-  IN      EFI_GUID                *VendorGuid,
-  IN      VOID                    *Data,
-  IN      UINTN                   DataSize,
-  IN      UINT32                  Attributes OPTIONAL,  
-  IN      UINT32                  KeyIndex  OPTIONAL,
-  IN      UINT64                  MonotonicCount  OPTIONAL,
-  IN      BOOLEAN                 VirtualMode,
-  IN      ESAL_VARIABLE_GLOBAL    *Global,
-  IN      VARIABLE_POINTER_TRACK  *Variable
-  );
-
-/**
-  Checks variable header.
-
-  This function checks if variable header is valid or not.
-
-  @param[in]  VariableAddress    Start address of variable header.
-  @param[in]  Volatile           TRUE  - Variable is volatile.
-                                 FALSE - Variable is non-volatile.
-  @param[in]  Global             Pointer to VARAIBLE_GLOBAL structure.
-  @param[in]  Instance           Instance of FV Block services.
-  @param[out] VariableHeader     Pointer to AUTHENTICATED_VARIABLE_HEADER for output.
-
-  @retval TRUE                   Variable header is valid.
-  @retval FALSE                  Variable header is not valid.
-
-**/
-BOOLEAN
-IsValidVariableHeader (
-  IN  EFI_PHYSICAL_ADDRESS              VariableAddress,
-  IN  BOOLEAN                           Volatile,
-  IN  VARIABLE_GLOBAL                   *Global,
-  IN  UINTN                             Instance,
-  OUT AUTHENTICATED_VARIABLE_HEADER     *VariableHeader  OPTIONAL
-  );
-
-/**
-  Flush the HOB variable to NV variable storage.
-**/
-VOID
-FlushHob2Nv (
-  VOID
-  );
-
-#endif
diff --git a/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf b/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
index fa7c39d6e5..cd97ae29a4 100644
--- a/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
+++ b/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
@@ -23,7 +23,7 @@
   UNLOAD_IMAGE                   = SecureBootConfigDriverUnload
 
 #
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#  VALID_ARCHITECTURES           = IA32 X64 EBC
 #
 
 [Sources]
-- 
2.16.2.windows.1



             reply	other threads:[~2018-06-13  3:45 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-06-13  3:45 chenc2 [this message]
2018-06-15  6:39 ` [PATCH 30/37] SecurityPkg: Removing ipf which is no longer supported from edk2 Zhang, Chao B

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20180613034544.3228-1-chen.a.chen@intel.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox