From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pf1-f179.google.com (mail-pf1-f179.google.com [209.85.210.179]) by mx.groups.io with SMTP id smtpd.web11.408.1685644205471665902 for ; Thu, 01 Jun 2023 11:30:05 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20221208 header.b=U6BifqSR; spf=pass (domain: gmail.com, ip: 209.85.210.179, mailfrom: kuqin12@gmail.com) Received: by mail-pf1-f179.google.com with SMTP id d2e1a72fcca58-650c8cb68aeso642290b3a.3 for ; Thu, 01 Jun 2023 11:30:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1685644205; x=1688236205; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=xHLuLvX52BWuwBp1Pz4D6u/xUVdJ1MQaaI6LYGQPQIU=; b=U6BifqSRzqOnlpCZLouE7AurLUsKvycaLYyPXgkP9dW1SuPTttogQmdAf7hiUlCApQ DdkTmuZgS//wFcYVAZvFQt/DTJBaqTdq9NjtDEis+L4QP29uyNOek5/o8vb2o/tV6zTN +n0yVHHXS9TZ1qZi9vnIxIJvEWSQJljOzXCNfjJHTXYkVEiDN6WbiyyGYnFufTQax+7D 6x1QQGOy8BK/+lU5BlZAEc4dRjkugbhXcQvLMZJcSZVQoSLw+MW3Q/UHv3S/W8HHYaq3 9dtFXswVI/b8UWU3dZVsRUZ3Um2sfkbRrLtZyIxCJ4KCK+eB8I8qdsUk/7Ssueokd3nP BK6Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1685644205; x=1688236205; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=xHLuLvX52BWuwBp1Pz4D6u/xUVdJ1MQaaI6LYGQPQIU=; b=bx9l6dapryO75frorvzaAuTDfbTU6hx8loShmemYbdGPvg+ivRtO6bVe5q2S/dCe7W tVrMmQM1xUCPdXiKTCiaxaeZx6xUgwVmvzCPyBixbGU/scONsCm8Jpel6cTMHD60Zwcu WpVI4Aj21bwayzTbEs9HQAiMT6IlT2kJ68vQB7oqhvXUeVwkEwYaHQ5hpwylbk+DBeEy dne7/BDAukxFXsM0evEBkYWLOAcwjWj/RNH61kVC7ix/ZfFa8EbHaQrlHQBZGnM/K2LS k93c63N2bF7mwiYm20nj+ODX7oo4az/PkXQj7GVTgSiNC8g5Ijqx5A329BHHjhVpwe+d ZA4w== X-Gm-Message-State: AC+VfDwyeKjWqI+Ew+wn+yKJclbwzRvLguA5fFueiNlQcikZulRzsErx X4+SlEx1dLHAdeh65X2djCuww1xcVyE= X-Google-Smtp-Source: ACHHUZ6peisy8iBwKpEHIphN6qfMcI+0ZxkMP2AU+Buz+z4fN4XRjit65yuggNXJGCFMCLV9rat3yQ== X-Received: by 2002:aa7:88c5:0:b0:63f:ffd:5360 with SMTP id k5-20020aa788c5000000b0063f0ffd5360mr9244216pff.21.1685644204602; Thu, 01 Jun 2023 11:30:04 -0700 (PDT) Return-Path: Received: from MININT-0U7P5GU.redmond.corp.microsoft.com ([2001:4898:80e8:36:652e:1aba:f961:866]) by smtp.gmail.com with ESMTPSA id v12-20020a62a50c000000b0063d44634d8csm5352054pfm.71.2023.06.01.11.30.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 01 Jun 2023 11:30:04 -0700 (PDT) From: "Kun Qin" To: devel@edk2.groups.io Cc: Jiewen Yao , Jian J Wang , Qi Zhang , Rahul Kumar Subject: [PATCH v1 3/3] SecurityPkg: SubClassTpm: Updated default value Date: Thu, 1 Jun 2023 11:29:56 -0700 Message-Id: <20230601182956.2068-4-kuqin12@gmail.com> X-Mailer: git-send-email 2.40.1.windows.1 In-Reply-To: <20230601182956.2068-1-kuqin12@gmail.com> References: <20230601182956.2068-1-kuqin12@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3966 This change updated the default value of TPM device subclass PCD to `0x010E0000` in order to match the definition of EFI_PERIPHERAL_TPM from PI specification v1.8. Cc: Jiewen Yao Cc: Jian J Wang Cc: Qi Zhang Cc: Rahul Kumar Signed-off-by: Kun Qin --- SecurityPkg/SecurityPkg.dec | 6 +++--- SecurityPkg/SecurityPkg.uni | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/SecurityPkg/SecurityPkg.dec b/SecurityPkg/SecurityPkg.dec index 0a8042d63fe1..53aa7ec43557 100644 --- a/SecurityPkg/SecurityPkg.dec +++ b/SecurityPkg/SecurityPkg.dec @@ -308,10 +308,10 @@ [PcdsFixedAtBuild, PcdsPatchableInModule] gEfiSecurityPkgTokenSpaceGuid.PcdTpmPlatformClass|0|UINT8|0x00000006=0D =0D ## Progress Code for TPM device subclass definitions.

=0D - # EFI_PERIPHERAL_TPM =3D (EFI_PERIPHERAL | 0x000D0000) =3D 0x010D0000<= BR>=0D + # EFI_PERIPHERAL_TPM =3D (EFI_PERIPHERAL | 0x000E0000) =3D 0x010E0000<= BR>=0D # @Prompt Status Code for TPM device definitions=0D - # @ValidList 0x80000003 | 0x010D0000=0D - gEfiSecurityPkgTokenSpaceGuid.PcdStatusCodeSubClassTpmDevice|0x010D0000|= UINT32|0x00000007=0D + # @ValidList 0x80000003 | 0x010E0000=0D + gEfiSecurityPkgTokenSpaceGuid.PcdStatusCodeSubClassTpmDevice|0x010E0000|= UINT32|0x00000007=0D =0D ## Defines the IO port used to trigger a software System Management Inte= rrupt (SMI).

=0D # Used as the SMI Command IO port by security functionality that trigge= rs a software SMI such=0D diff --git a/SecurityPkg/SecurityPkg.uni b/SecurityPkg/SecurityPkg.uni index 68587304d779..6c28b8021333 100644 --- a/SecurityPkg/SecurityPkg.uni +++ b/SecurityPkg/SecurityPkg.uni @@ -169,7 +169,7 @@ #string STR_gEfiSecurityPkgTokenSpaceGuid_PcdStatusCodeSubClassTpmDevice_P= ROMPT #language en-US "Status Code for TPM device definitions"=0D =0D #string STR_gEfiSecurityPkgTokenSpaceGuid_PcdStatusCodeSubClassTpmDevice_H= ELP #language en-US "Progress Code for TPM device subclass definitions.
\n"=0D - = "EFI_PERIPHERAL_TPM =3D (EFI_PERIPHERAL | 0x000D0000)= =3D 0x010D0000
"=0D + = "EFI_PERIPHERAL_TPM =3D (EFI_PERIPHERAL | 0x000E0000)= =3D 0x010E0000
"=0D =0D #string STR_gEfiSecurityPkgTokenSpaceGuid_PcdRsa2048Sha256PublicKeyBuffer_= PROMPT #language en-US "One or more SHA 256 Hashes of RSA 2048 bit public = keys used to verify Recovery and Capsule Update images"=0D =0D --=20 2.40.1.windows.1