From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by mx.groups.io with SMTP id smtpd.web12.151.1648245783678401973 for ; Fri, 25 Mar 2022 15:03:04 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=j4OcXSuA; spf=pass (domain: intel.com, ip: 134.134.136.65, mailfrom: judah.vang@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1648245783; x=1679781783; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=ukurrqC1eM3IT47JXwoIoSu0pfLMDYybgsUgfYeufYc=; b=j4OcXSuANTQ/9GnJtEytNcxaY7P+N/TpbofN7ZvzZhGpGa0uaoUHIm3m WNpMPTKN4QoE6vjvVfL4J9IZb4/YmPdvN5laIUl5vJ+Mghyw3FQbd2K9u 54gJ0qkrVWW2Yv8MeiSCndl6620K9J4gOs6UZxWagv3/EsP+dh5iKV0rx 7nbYnvRZRzN5Ovds5h5ncGjJH80jnUhPtKGgpivneDHKjgiVRFZfxDuYh xf9NlnEjrq4CYEqVriiC/iQBhyStE8cngh2u+/7U+6SpzAEL+AZ70q7hM vV9CPdbGq3rf+eqoBxQtXvwFRncp08CqqLLxpa6yiFxWIhUMRBZWv3ouZ g==; X-IronPort-AV: E=McAfee;i="6200,9189,10297"; a="258692683" X-IronPort-AV: E=Sophos;i="5.90,211,1643702400"; d="scan'208";a="258692683" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 25 Mar 2022 15:03:03 -0700 X-IronPort-AV: E=Sophos;i="5.90,211,1643702400"; d="scan'208";a="561990557" Received: from jvang-mobl.amr.corp.intel.com ([10.212.95.18]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 25 Mar 2022 15:03:02 -0700 From: judah.vang@intel.com To: devel@edk2.groups.io Cc: Jian J Wang , Liming Gao , Nishant C Mistry Subject: [PATCH v1 01/28] MdeModulePkg: Add a new GUID Date: Fri, 25 Mar 2022 15:02:43 -0700 Message-Id: <20220325220243.1741-1-judah.vang@intel.com> X-Mailer: git-send-email 2.35.1.windows.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2594 Add a new Variable Store Guid. Cc: Jian J Wang Cc: Liming Gao Cc: Nishant C Mistry Signed-off-by: Judah Vang --- MdeModulePkg/MdeModulePkg.dec | 13 ++++++++++++- 1 file changed, 12 insertions(+), 1 deletion(-) diff --git a/MdeModulePkg/MdeModulePkg.dec b/MdeModulePkg/MdeModulePkg.dec index 40601c95832b..681607db0da6 100644 --- a/MdeModulePkg/MdeModulePkg.dec +++ b/MdeModulePkg/MdeModulePkg.dec @@ -4,7 +4,7 @@ # and libraries instances, which are used for those modules. # # Copyright (c) 2019, NVIDIA CORPORATION. All rights reserved. -# Copyright (c) 2007 - 2021, Intel Corporation. All rights reserved.
+# Copyright (c) 2007 - 2022, Intel Corporation. All rights reserved.
# Copyright (c) 2016, Linaro Ltd. All rights reserved.
# (C) Copyright 2016 - 2019 Hewlett Packard Enterprise Development LP
# Copyright (c) 2017, AMD Incorporated. All rights reserved.
@@ -93,6 +93,14 @@ [LibraryClasses] # TpmMeasurementLib|Include/Library/TpmMeasurementLib.h + ## @libraryclass Provides interfaces to encrypt/decrypt variable. + # + EncryptionVariableLib|Include/Library/EncryptionVariableLib.h + + ## @libraryclass Provides interfaces to encrypt/decrypt variable. + # + ProtectedVariableLib|Include/Library/ProtectedVariableLib.h + ## @libraryclass Provides authenticated variable services. # AuthVariableLib|Include/Library/AuthVariableLib.h @@ -505,6 +513,9 @@ [Ppis] gEdkiiPeiCapsuleOnDiskPpiGuid = { 0x71a9ea61, 0x5a35, 0x4a5d, { 0xac, 0xef, 0x9c, 0xf8, 0x6d, 0x6d, 0x67, 0xe0 } } gEdkiiPeiBootInCapsuleOnDiskModePpiGuid = { 0xb08a11e4, 0xe2b7, 0x4b75, { 0xb5, 0x15, 0xaf, 0x61, 0x6, 0x68, 0xbf, 0xd1 } } + ## Include/Ppi/ReadOnlyVariable2.h + gEfiPeiVariableStoreDiscoveredPpiGuid = { 0xa2fc038d, 0xfdf5, 0x4501, { 0xaf, 0x8e, 0x69, 0xb0, 0x20, 0xec, 0xe6, 0x63 } } + [Protocols] ## Load File protocol provides capability to load and unload EFI image into memory and execute it. # Include/Protocol/LoadPe32Image.h -- 2.26.2.windows.1