sfu5 
							
						 
					 
					
						
						
							
						
						275beb2b53 
					 
					
						
						
							
							1. Correct the counter-based hash algorithm according to UEFI spec.  
						
						... 
						
						
						
						2. Check the reserverd bit in variable attribute.
3. Return EFI_OUT_OF_RESOURCE instead of EFI_SECURITY_VIOLATION if there is not enough speace to store the public key.
4. Fix a bug when deleting a non-existent time-based auth variable, we store the certificate into cert DB incorrectly.
5. Fix a bug that time-based auth variable can't been updated again after append operation.
Signed-off-by: Fu Siyuan <siyuan.fu@intel.com >
Reviewed-by: Ye Ting  <ting.ye@intel.com >
Reviewed-by: Dong Guo <guo.dong@intel.com >
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13957  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-11-21 08:06:02 +00:00 
						 
				 
			
				
					
						
							
							
								gdong1 
							
						 
					 
					
						
						
							
						
						89be2b037f 
					 
					
						
						
							
							Fix time-based and count-based authenticated variable can be updated by each other without verification.  
						
						... 
						
						
						
						Signed-off-by: Dong Guo <guo.dong@intel.com >
Reviewed-by: Ye Ting <ting.ye@intel.com >
Reviewed-by: Fu Siyuan <siyuan.fu@intel.com >
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13848  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-10-15 06:08:22 +00:00 
						 
				 
			
				
					
						
							
							
								sfu5 
							
						 
					 
					
						
						
							
						
						42ed76042a 
					 
					
						
						
							
							1. Fix a bug when comparing two timestamp in auth-variable driver.  
						
						... 
						
						
						
						2. Remove the TimeCompare function in Bds since it's not used anymore.
Signed-off-by: Fu Siyuan <siyuan.fu@intel.com >
Reviewed-by: Ye Ting  <ting.ye@intel.com >
Reviewed-by: Dong Guo <guo.dong@intel.com >
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13731  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-09-14 02:59:35 +00:00 
						 
				 
			
				
					
						
							
							
								erictian 
							
						 
					 
					
						
						
							
						
						ad84df72c7 
					 
					
						
						
							
							SecurityPkg/VariableSmm: Fix a VariableSmm bug when reading variable with size 0.  
						
						... 
						
						
						
						Signed-off-by: Tian, Feng <feng.tian@intel.com >
Reviewed-by: Zhang, Chao <chao.b.zhang@intel.com >
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13726  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-09-12 08:25:25 +00:00 
						 
				 
			
				
					
						
							
							
								sfu5 
							
						 
					 
					
						
						
							
						
						f6e233534e 
					 
					
						
						
							
							1. Initialize certdb variable with correct value of list size.  
						
						... 
						
						
						
						2. Use gloable database array instead of calling AllocateZeroPool in SetVariable.
Signed-off-by: Fu Siyuan <siyuan.fu@intel.com >
Reviewed-by: Ye Ting  <ting.ye@intel.com >
Reviewed-by: Dong Guo <guo.dong@intel.com >
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13671  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-08-23 06:53:51 +00:00 
						 
				 
			
				
					
						
							
							
								lzeng14 
							
						 
					 
					
						
						
							
						
						8f3a9e5862 
					 
					
						
						
							
							LastVariableOffset is wrongly set to 0 when FtwVariableSpace() fails. Recalculate the HwErrVariableTotalSize, HwErrVariableTotalSize and LastVariableOffset when FtwVariableSpace() fails.  
						
						... 
						
						
						
						Signed-off-by: Star Zeng <star.zeng@intel.com >
Reviewed-by: Guo Dong <guo.dong@intel.com >
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13593  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-08-06 03:20:10 +00:00 
						 
				 
			
				
					
						
							
							
								sfu5 
							
						 
					 
					
						
						
							
						
						e77f9ef656 
					 
					
						
						
							
							Use RsaGetPublicKeyFromX509() to validate the given X.509 certificate for PK/KEK/db/dbx database.  
						
						... 
						
						
						
						Signed-off-by: Fu Siyuan <siyuan.fu@intel.com >
Reviewed-by: Dong Guo <guo.dong@intel.com >
Reviewed-by: Ye Ting <ting.ye@intel.com >
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13553  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-07-25 02:01:58 +00:00 
						 
				 
			
				
					
						
							
							
								sfu5 
							
						 
					 
					
						
						
							
						
						05a643f91d 
					 
					
						
						
							
							1. Remove extra attribute for SetupMode, SignatureSupport and SecureBoot variable.  
						
						... 
						
						
						
						2. Allow the PK owner to update db/dbx variable directly.
Signed-off-by: Fu Siyuan <siyuan.fu@intel.com >
Reviewed-by: Dong Guo <guo.dong@intel.com >
Reviewed-by: Ye Ting <ting.ye@intel.com >
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13536  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-07-17 08:38:58 +00:00 
						 
				 
			
				
					
						
							
							
								sfu5 
							
						 
					 
					
						
						
							
						
						876ac39540 
					 
					
						
						
							
							Return EFI_UNSUPPORTED if READY_TO_BOOT function is invoked at SMM runtime.  
						
						... 
						
						
						
						Signed-off-by: Fu Siyuan <siyuan.fu@intel.com >
Reviewed-by: Dong Guo <guo.dong@intel.com >
Reviewed-by: Ye Ting <ting.ye@intel.com >
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13535  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-07-17 08:21:42 +00:00 
						 
				 
			
				
					
						
							
							
								sfu5 
							
						 
					 
					
						
						
							
						
						785d84ead0 
					 
					
						
						
							
							Verify the provided PKpub is signed with its private key when enrolling a new PK variable in setup mode.  
						
						... 
						
						
						
						Signed-off-by: Fu Siyuan <siyuan.fu@intel.com >
Reviewed-by: Dong Guo <guo.dong@intel.com >
Reviewed-by: Ye Ting <ting.ye@intel.com >
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13531  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-07-13 06:12:58 +00:00 
						 
				 
			
				
					
						
							
							
								czhang46 
							
						 
					 
					
						
						
							
						
						25a4e71aa6 
					 
					
						
						
							
							Add SMRAM range check to variable SMM SMI handler.  
						
						... 
						
						
						
						git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13514  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-07-09 08:26:35 +00:00 
						 
				 
			
				
					
						
							
							
								ydong10 
							
						 
					 
					
						
						
							
						
						96277f7402 
					 
					
						
						
							
							Include read data buffer in CommBufferSize when calculate the buffer size.  
						
						... 
						
						
						
						Signed-off-by: Eric Dong <eric.dong@intel.com >
Reviewed-by: Chao Zhang <chao.b.zhang@intel.com >
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13512  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-07-09 02:03:47 +00:00 
						 
				 
			
				
					
						
							
							
								sfu5 
							
						 
					 
					
						
						
							
						
						8f8ca22e59 
					 
					
						
						
							
							1. Reset system when user changes secure boot state in secure boot configuration form.  
						
						... 
						
						
						
						2. Update the method to detect secure boot state in DxeImageVerificationLib and secure boot configuration driver.
Signed-off-by: Fu Siyuan <siyuan.fu@intel.com >
Reviewed-by: Dong Guo <guo.dong@intel.com >
Reviewed-by: Ye Ting <ting.ye@intel.com >
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13505  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-07-05 08:08:12 +00:00 
						 
				 
			
				
					
						
							
							
								sfu5 
							
						 
					 
					
						
						
							
						
						12373f2cfe 
					 
					
						
						
							
							Fix a buffer overflow bug in VariableSmm driver.  
						
						... 
						
						
						
						Signed-off-by: Fu Siyuan <siyuan.fu@intel.com >
Reviewed-by: Dong Guo <guo.dong@intel.com >
Reviewed-by: Zhang Chao <chao.b.zhang@intel.com >
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13486  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-07-04 04:39:18 +00:00 
						 
				 
			
				
					
						
							
							
								jyao1 
							
						 
					 
					
						
						
							
						
						dc204d5a0f 
					 
					
						
						
							
							Add comment for modules which have external input.  
						
						... 
						
						
						
						signed-off-by: jiewen.yao@intel.com 
reviewed-by: guo.dong@intel.com 
reviewed-by: ting.ye@intel.com 
reviewed-by: liming.gao@intel.com 
reviewed-by: elvin.li@intel.com 
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13446  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-06-12 08:28:43 +00:00 
						 
				 
			
				
					
						
							
							
								lzeng14 
							
						 
					 
					
						
						
							
						
						a5f15e3025 
					 
					
						
						
							
							According to UEFI spec 2.3.1a. hardware error record variable should use the EFI_HARDWARE_ERROR_VARIABLE VendorGuid and have the L"HwErrRec####" name convention, #### is a printed hex value and no 0x or h is included in the hex value.  
						
						... 
						
						
						
						Signed-off-by: Star Zeng <star.zeng@intel.com >
Reviewed-by: Guo Dong <guo.dong@intel.com >
Reviewed-by: Jiewen Yao <jiewen.yao@intel.com >
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13373  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-05-30 02:53:10 +00:00 
						 
				 
			
				
					
						
							
							
								lzeng14 
							
						 
					 
					
						
						
							
						
						021a1af927 
					 
					
						
						
							
							Return EFI_WRITE_PROTECTED when setting HwErrRecSupport Global Variable at runtime.  
						
						... 
						
						
						
						Signed-off-by: Star Zeng <star.zeng@intel.com >
Reviewed-by: Guo Dong <guo.dong@intel.com >
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13372  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-05-30 02:42:26 +00:00 
						 
				 
			
				
					
						
							
							
								sfu5 
							
						 
					 
					
						
						
							
						
						8c1babfd28 
					 
					
						
						
							
							Update auth-variable and secure boot UI driver to support only time-based PK, KEK and Signature Database variable variable according to UEFI Spec requirement.  
						
						... 
						
						
						
						Signed-off-by: Fu Siyuan <siyuan.fu@intel.com >
Reviewed-by: Dong Guo <guo.dong@intel.com >
Reviewed-by: Ye Ting <ting.ye@intel.com >
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13310  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-05-14 07:36:20 +00:00 
						 
				 
			
				
					
						
							
							
								sfu5 
							
						 
					 
					
						
						
							
						
						4e33001c6e 
					 
					
						
						
							
							Fixes buffer read overflow bugs in authenticated variable driver.  
						
						... 
						
						
						
						Signed-off-by: Fu Siyuan <siyuan.fu@intel.com >
Reviewed-by: Dong Guo <guo.dong@intel.com >
Reviewed-by: Ye Ting <ting.ye@intel.com >
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13298  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-05-09 10:45:09 +00:00 
						 
				 
			
				
					
						
							
							
								tye1 
							
						 
					 
					
						
						
							
						
						389c8779e8 
					 
					
						
						
							
							Fix common AuthVariable protection issue.  
						
						... 
						
						
						
						Signed-off-by: Ye Ting<ting.ye@intel.com >
Reviewed by: Fu, Siyuan <siyuan.fu@intel.com >
Reviewed by: Dong, Guo <guo.dong@intel.com >
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13204  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-04-23 06:17:17 +00:00 
						 
				 
			
				
					
						
							
							
								tye1 
							
						 
					 
					
						
						
							
						
						ed47ae0274 
					 
					
						
						
							
							Update common authenticated variable (non PK/KEK/DB/DBX) support to comply with latest UEFI spec.  
						
						... 
						
						
						
						Signed-off by: tye1
Reviewed-by: geekboy15a
Reviewed-by: sfu5
Reviewed-by: gdong1
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13157  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-03-31 04:42:20 +00:00 
						 
				 
			
				
					
						
							
							
								lzeng14 
							
						 
					 
					
						
						
							
						
						9622df63df 
					 
					
						
						
							
							If setting variable in Runtime and there has been a same GUID and name variable existed in system without RT attribute, return EFI_WRITE_PROTECTED.  
						
						... 
						
						
						
						Signed-off-by: lzeng14
Reviewed-by: tye
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13156  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-03-30 07:19:44 +00:00 
						 
				 
			
				
					
						
							
							
								sfu5 
							
						 
					 
					
						
						
							
						
						ecc722ad41 
					 
					
						
						
							
							1. Remove “Force clear PK” feature in AuthVarialbe driver.  
						
						... 
						
						
						
						2. Update API ForceClearPK() to UserPhysicalPresent() in PlatformSecureLib.
2. Update SecureBootConfigDxe driver and AuthVariable driver to support Custom Secure Boot Mode feature.
3. Fix some bugs in AuthVariable driver.
Signed-off-by: sfu5
Reviewed-by: tye
Reviewed-by: gdong1
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13144  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-03-27 08:17:23 +00:00 
						 
				 
			
				
					
						
							
							
								sfu5 
							
						 
					 
					
						
						
							
						
						6bc4e19fec 
					 
					
						
						
							
							1. Update AuthVarialbe driver to avoid integer overflow when using EFI_VARIABLE_AUTHENTICATION_2 descriptor.  
						
						... 
						
						
						
						Signed-off-by: sfu5
Reviewed-by: tye
Reviewed-by: gdong1
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13120  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2012-03-26 01:43:45 +00:00 
						 
				 
			
				
					
						
							
							
								oliviermartin 
							
						 
					 
					
						
						
							
						
						4d832aabbf 
					 
					
						
						
							
							SecurityPkg/VariableAuthenticated: Check if there is a NV Variable Storage header prior to use its attributes  
						
						... 
						
						
						
						The Variable PEI and RuntimeDxe drivers were using the attribute 'HeaderLength' of
EFI_FIRMWARE_VOLUME_HEADER without checking if a Firmware Volume Header was existing at
the base address.
In case the Firmware Volume Header does not exist or is corrupted, the attribute 'HeaderLength'
is a non valid value that can lead to a non valid physical address when accessing produces an
access error.
Signed-off-by: oliviermartin
Reviewed-by: rsun3
Reviewed-by: niruiyu
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@12845  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2011-12-13 09:42:36 +00:00 
						 
				 
			
				
					
						
							
							
								gdong1 
							
						 
					 
					
						
						
							
						
						ae09f9796c 
					 
					
						
						
							
							Update SignatureSupport variable to reflect firmware capability.  
						
						... 
						
						
						
						Signed-off-by: gdong1
Reviewed-by: tye
Reviewed-by: sfu5
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@12843  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2011-12-13 08:49:48 +00:00 
						 
				 
			
				
					
						
							
							
								sfu5 
							
						 
					 
					
						
						
							
						
						855609196d 
					 
					
						
						
							
							1. Fix a bug when verify the CertType GUID in authentication variable data payload.  
						
						... 
						
						
						
						Signed-off-by: sfu5
Reviewed-by: tye1
Reviewed-by: gdong1
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@12831  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2011-12-09 07:22:59 +00:00 
						 
				 
			
				
					
						
							
							
								gdong1 
							
						 
					 
					
						
						
							
						
						2e24814ac9 
					 
					
						
						
							
							Update a return status for UEFI spec compliance.  
						
						... 
						
						
						
						Signed-off-by: gdong1
Reviewed-by: tye
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@12813  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2011-12-02 07:51:23 +00:00 
						 
				 
			
				
					
						
							
							
								sfu5 
							
						 
					 
					
						
						
							
						
						d912bad783 
					 
					
						
						
							
							1. Check input PK/KEK variable data to make sure it is a valid EFI_SIGNATURE_LIST.  
						
						... 
						
						
						
						Signed-off-by: sfu5
Reviewed-by: gdong1
Reviewed-by : czhan46
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@12765  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2011-11-23 05:10:40 +00:00 
						 
				 
			
				
					
						
							
							
								gdong1 
							
						 
					 
					
						
						
							
						
						7aaf2fd67c 
					 
					
						
						
							
							Add debug information for secure boot test convenient.  
						
						... 
						
						
						
						Signed-off-by: gdong1
Reviewed-by: tye
Reviewed-by: xdu2
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@12660  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2011-11-04 05:41:06 +00:00 
						 
				 
			
				
					
						
							
							
								xdu2 
							
						 
					 
					
						
						
							
						
						2d3fb91987 
					 
					
						
						
							
							SecurityPkg: Update VariableAuthenticated driver with following changes:  
						
						... 
						
						
						
						1. Remove memory allocation code in runtime.
2. Exclude NULL terminator in VariableName for serialization data in time-based variable authentication.
3. Add support for enroll PK with WRITE_ACCESS attribute.
4. Initialize SetupMode variable with correct NV attribute.
5. Add support for APPEND_WRITE attribute for non-existing Variable.
6. Clear KEK, DB and DBX as well as PK when user request to clear platform keys.
7. Check duplicated EFI_SIGNATURE_DATA for Variable formatted as EFI_SIGNATURE_LIST when APPEND_WRITE attribute is set.
8. Not change SecureBoot Variable in runtime, only update it in boot time since this Variable indicates firmware operating mode.
9. Save time stamp of PK when PK is set with TIME_BASED_WRITE_ACCESS attribute in setup mode.
10. Update to use PcdMaxVariableSize instead of PcdMaxAppendVariableSize for append operation.
Signed-off-by: xdu2
Reviewed-by: tye
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@12599  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2011-10-28 09:55:09 +00:00 
						 
				 
			
				
					
						
							
							
								qianouyang 
							
						 
					 
					
						
						
							
						
						beda2356f5 
					 
					
						
						
							
							Enable/Disable Secured Boot by 'Secure Boot Configuration' Page which is under Setup browser.  
						
						... 
						
						
						
						Signed-off-by: qianouyang
Reviewed-by: gdong1
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@12586  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2011-10-28 03:46:20 +00:00 
						 
				 
			
				
					
						
							
							
								niruiyu 
							
						 
					 
					
						
						
							
						
						9a000b464f 
					 
					
						
						
							
							Support Variable driver (VariableAuthenticatedPei/VariableAuthenticatedRuntimeDxe) to support the default variable data stored in HOB.  
						
						... 
						
						
						
						Signed-off-by: niruiyu
Reviewed-by: lgao4
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@12554  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2011-10-19 12:40:52 +00:00 
						 
				 
			
				
					
						
							
							
								sfu5 
							
						 
					 
					
						
						
							
						
						3b4151bcb4 
					 
					
						
						
							
							Add pointer check for NULL before dereference it.  
						
						... 
						
						
						
						Signed-off-by: sfu5
Reviewed-by: tye
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@12537  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2011-10-14 05:19:25 +00:00 
						 
				 
			
				
					
						
							
							
								hhuan13 
							
						 
					 
					
						
						
							
						
						648f98d15b 
					 
					
						
						
							
							1. Enhance AuthVar driver to avoid process corrupted certificate input.  
						
						... 
						
						
						
						Signed-off-by: hhuan13
Reviewed-by: ftian
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@12398  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2011-09-21 05:17:50 +00:00 
						 
				 
			
				
					
						
							
							
								gdong1 
							
						 
					 
					
						
						
							
						
						0c18794ea4 
					 
					
						
						
							
							Add security package to repository.  
						
						... 
						
						
						
						git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@12261  6f19259b-4bc3-4df7-8a09-765794883524 
						
						
					 
					
						2011-09-02 07:49:32 +00:00