SecurityPkg: Apply uncrustify changes
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3737 Apply uncrustify changes to .c/.h files in the SecurityPkg package Cc: Andrew Fish <afish@apple.com> Cc: Leif Lindholm <leif@nuviainc.com> Cc: Michael D Kinney <michael.d.kinney@intel.com> Signed-off-by: Michael Kubacki <michael.kubacki@microsoft.com> Reviewed-by: Jian J Wang <jian.j.wang@intel.com>
This commit is contained in:
committed by
mergify[bot]
parent
39de741e2d
commit
c411b485b6
@@ -8,7 +8,6 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
#include "SecureBootConfigImpl.h"
|
||||
|
||||
|
||||
/**
|
||||
This function converts an input device structure to a Unicode string.
|
||||
|
||||
@@ -20,7 +19,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
CHAR16 *
|
||||
EFIAPI
|
||||
DevicePathToStr (
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *DevPath
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *DevPath
|
||||
)
|
||||
{
|
||||
return ConvertDevicePathToText (
|
||||
@@ -29,4 +28,3 @@ DevicePathToStr (
|
||||
TRUE
|
||||
);
|
||||
}
|
||||
|
||||
|
@@ -23,17 +23,17 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
SecureBootConfigDriverEntryPoint (
|
||||
IN EFI_HANDLE ImageHandle,
|
||||
IN EFI_SYSTEM_TABLE *SystemTable
|
||||
IN EFI_HANDLE ImageHandle,
|
||||
IN EFI_SYSTEM_TABLE *SystemTable
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
SECUREBOOT_CONFIG_PRIVATE_DATA *PrivateData;
|
||||
EFI_STATUS Status;
|
||||
SECUREBOOT_CONFIG_PRIVATE_DATA *PrivateData;
|
||||
|
||||
//
|
||||
// If already started, return.
|
||||
//
|
||||
Status = gBS->OpenProtocol (
|
||||
Status = gBS->OpenProtocol (
|
||||
ImageHandle,
|
||||
&gEfiCallerIdGuid,
|
||||
NULL,
|
||||
@@ -100,13 +100,13 @@ SecureBootConfigDriverUnload (
|
||||
IN EFI_HANDLE ImageHandle
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
SECUREBOOT_CONFIG_PRIVATE_DATA *PrivateData;
|
||||
EFI_STATUS Status;
|
||||
SECUREBOOT_CONFIG_PRIVATE_DATA *PrivateData;
|
||||
|
||||
Status = gBS->HandleProtocol (
|
||||
ImageHandle,
|
||||
&gEfiCallerIdGuid,
|
||||
(VOID **) &PrivateData
|
||||
(VOID **)&PrivateData
|
||||
);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
|
@@ -8,10 +8,10 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
#include "SecureBootConfigImpl.h"
|
||||
|
||||
VOID *mStartOpCodeHandle = NULL;
|
||||
VOID *mEndOpCodeHandle = NULL;
|
||||
EFI_IFR_GUID_LABEL *mStartLabel = NULL;
|
||||
EFI_IFR_GUID_LABEL *mEndLabel = NULL;
|
||||
VOID *mStartOpCodeHandle = NULL;
|
||||
VOID *mEndOpCodeHandle = NULL;
|
||||
EFI_IFR_GUID_LABEL *mStartLabel = NULL;
|
||||
EFI_IFR_GUID_LABEL *mEndLabel = NULL;
|
||||
|
||||
/**
|
||||
Refresh the global UpdateData structure.
|
||||
@@ -37,12 +37,12 @@ RefreshUpdateData (
|
||||
//
|
||||
// Create Hii Extend Label OpCode as the start opcode
|
||||
//
|
||||
mStartLabel = (EFI_IFR_GUID_LABEL *) HiiCreateGuidOpCode (
|
||||
mStartOpCodeHandle,
|
||||
&gEfiIfrTianoGuid,
|
||||
NULL,
|
||||
sizeof (EFI_IFR_GUID_LABEL)
|
||||
);
|
||||
mStartLabel = (EFI_IFR_GUID_LABEL *)HiiCreateGuidOpCode (
|
||||
mStartOpCodeHandle,
|
||||
&gEfiIfrTianoGuid,
|
||||
NULL,
|
||||
sizeof (EFI_IFR_GUID_LABEL)
|
||||
);
|
||||
mStartLabel->ExtendOpCode = EFI_IFR_EXTEND_OP_LABEL;
|
||||
}
|
||||
|
||||
@@ -55,8 +55,8 @@ RefreshUpdateData (
|
||||
**/
|
||||
VOID
|
||||
CleanUpPage (
|
||||
IN UINT16 LabelId,
|
||||
IN SECUREBOOT_CONFIG_PRIVATE_DATA *PrivateData
|
||||
IN UINT16 LabelId,
|
||||
IN SECUREBOOT_CONFIG_PRIVATE_DATA *PrivateData
|
||||
)
|
||||
{
|
||||
RefreshUpdateData ();
|
||||
@@ -87,39 +87,38 @@ CleanUpPage (
|
||||
**/
|
||||
CHAR16 *
|
||||
ExtractFileNameFromDevicePath (
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *DevicePath
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *DevicePath
|
||||
)
|
||||
{
|
||||
CHAR16 *String;
|
||||
CHAR16 *MatchString;
|
||||
CHAR16 *LastMatch;
|
||||
CHAR16 *FileName;
|
||||
UINTN Length;
|
||||
CHAR16 *String;
|
||||
CHAR16 *MatchString;
|
||||
CHAR16 *LastMatch;
|
||||
CHAR16 *FileName;
|
||||
UINTN Length;
|
||||
|
||||
ASSERT(DevicePath != NULL);
|
||||
ASSERT (DevicePath != NULL);
|
||||
|
||||
String = DevicePathToStr(DevicePath);
|
||||
String = DevicePathToStr (DevicePath);
|
||||
MatchString = String;
|
||||
LastMatch = String;
|
||||
FileName = NULL;
|
||||
|
||||
while(MatchString != NULL){
|
||||
while (MatchString != NULL) {
|
||||
LastMatch = MatchString + 1;
|
||||
MatchString = StrStr(LastMatch,L"\\");
|
||||
MatchString = StrStr (LastMatch, L"\\");
|
||||
}
|
||||
|
||||
Length = StrLen(LastMatch);
|
||||
FileName = AllocateCopyPool ((Length + 1) * sizeof(CHAR16), LastMatch);
|
||||
Length = StrLen (LastMatch);
|
||||
FileName = AllocateCopyPool ((Length + 1) * sizeof (CHAR16), LastMatch);
|
||||
if (FileName != NULL) {
|
||||
*(FileName + Length) = 0;
|
||||
}
|
||||
|
||||
FreePool(String);
|
||||
FreePool (String);
|
||||
|
||||
return FileName;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Update the form base on the selected file.
|
||||
|
||||
@@ -131,19 +130,20 @@ ExtractFileNameFromDevicePath (
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
UpdatePage(
|
||||
UpdatePage (
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FilePath,
|
||||
IN EFI_FORM_ID FormId
|
||||
)
|
||||
{
|
||||
CHAR16 *FileName;
|
||||
EFI_STRING_ID StringToken;
|
||||
CHAR16 *FileName;
|
||||
EFI_STRING_ID StringToken;
|
||||
|
||||
FileName = NULL;
|
||||
|
||||
if (FilePath != NULL) {
|
||||
FileName = ExtractFileNameFromDevicePath(FilePath);
|
||||
FileName = ExtractFileNameFromDevicePath (FilePath);
|
||||
}
|
||||
|
||||
if (FileName == NULL) {
|
||||
//
|
||||
// FileName = NULL has two case:
|
||||
@@ -153,6 +153,7 @@ UpdatePage(
|
||||
//
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
StringToken = HiiSetString (gSecureBootPrivateData->HiiHandle, 0, FileName, NULL);
|
||||
|
||||
gSecureBootPrivateData->FileContext->FileName = FileName;
|
||||
@@ -175,7 +176,7 @@ UpdatePage(
|
||||
0,
|
||||
0,
|
||||
0
|
||||
);
|
||||
);
|
||||
|
||||
HiiUpdateForm (
|
||||
gSecureBootPrivateData->HiiHandle,
|
||||
@@ -199,11 +200,10 @@ UpdatePage(
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
UpdatePKFromFile (
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FilePath
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FilePath
|
||||
)
|
||||
{
|
||||
return UpdatePage(FilePath, FORMID_ENROLL_PK_FORM);
|
||||
|
||||
return UpdatePage (FilePath, FORMID_ENROLL_PK_FORM);
|
||||
}
|
||||
|
||||
/**
|
||||
@@ -217,10 +217,10 @@ UpdatePKFromFile (
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
UpdateKEKFromFile (
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FilePath
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FilePath
|
||||
)
|
||||
{
|
||||
return UpdatePage(FilePath, FORMID_ENROLL_KEK_FORM);
|
||||
return UpdatePage (FilePath, FORMID_ENROLL_KEK_FORM);
|
||||
}
|
||||
|
||||
/**
|
||||
@@ -234,10 +234,10 @@ UpdateKEKFromFile (
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
UpdateDBFromFile (
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FilePath
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FilePath
|
||||
)
|
||||
{
|
||||
return UpdatePage(FilePath, SECUREBOOT_ENROLL_SIGNATURE_TO_DB);
|
||||
return UpdatePage (FilePath, SECUREBOOT_ENROLL_SIGNATURE_TO_DB);
|
||||
}
|
||||
|
||||
/**
|
||||
@@ -251,10 +251,10 @@ UpdateDBFromFile (
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
UpdateDBXFromFile (
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FilePath
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FilePath
|
||||
)
|
||||
{
|
||||
return UpdatePage(FilePath, SECUREBOOT_ENROLL_SIGNATURE_TO_DBX);
|
||||
return UpdatePage (FilePath, SECUREBOOT_ENROLL_SIGNATURE_TO_DBX);
|
||||
}
|
||||
|
||||
/**
|
||||
@@ -268,9 +268,8 @@ UpdateDBXFromFile (
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
UpdateDBTFromFile (
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FilePath
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FilePath
|
||||
)
|
||||
{
|
||||
return UpdatePage(FilePath, SECUREBOOT_ENROLL_SIGNATURE_TO_DBT);
|
||||
return UpdatePage (FilePath, SECUREBOOT_ENROLL_SIGNATURE_TO_DBT);
|
||||
}
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
@@ -48,20 +48,20 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
//
|
||||
// Tool generated IFR binary data and String package data
|
||||
//
|
||||
extern UINT8 SecureBootConfigBin[];
|
||||
extern UINT8 SecureBootConfigDxeStrings[];
|
||||
extern UINT8 SecureBootConfigBin[];
|
||||
extern UINT8 SecureBootConfigDxeStrings[];
|
||||
|
||||
//
|
||||
// Shared IFR form update data
|
||||
//
|
||||
extern VOID *mStartOpCodeHandle;
|
||||
extern VOID *mEndOpCodeHandle;
|
||||
extern EFI_IFR_GUID_LABEL *mStartLabel;
|
||||
extern EFI_IFR_GUID_LABEL *mEndLabel;
|
||||
extern VOID *mStartOpCodeHandle;
|
||||
extern VOID *mEndOpCodeHandle;
|
||||
extern EFI_IFR_GUID_LABEL *mStartLabel;
|
||||
extern EFI_IFR_GUID_LABEL *mEndLabel;
|
||||
|
||||
#define MAX_CHAR 480
|
||||
#define TWO_BYTE_ENCODE 0x82
|
||||
#define BUFFER_MAX_SIZE 100
|
||||
#define MAX_CHAR 480
|
||||
#define TWO_BYTE_ENCODE 0x82
|
||||
#define BUFFER_MAX_SIZE 100
|
||||
|
||||
//
|
||||
// SHA-256 digest size in bytes
|
||||
@@ -79,24 +79,24 @@ extern EFI_IFR_GUID_LABEL *mEndLabel;
|
||||
//
|
||||
// Set max digest size as SHA512 Output (64 bytes) by far
|
||||
//
|
||||
#define MAX_DIGEST_SIZE SHA512_DIGEST_SIZE
|
||||
#define MAX_DIGEST_SIZE SHA512_DIGEST_SIZE
|
||||
|
||||
#define WIN_CERT_UEFI_RSA2048_SIZE 256
|
||||
#define WIN_CERT_UEFI_RSA2048_SIZE 256
|
||||
|
||||
//
|
||||
// Support hash types
|
||||
//
|
||||
#define HASHALG_SHA224 0x00000000
|
||||
#define HASHALG_SHA256 0x00000001
|
||||
#define HASHALG_SHA384 0x00000002
|
||||
#define HASHALG_SHA512 0x00000003
|
||||
#define HASHALG_RAW 0x00000004
|
||||
#define HASHALG_MAX 0x00000004
|
||||
#define HASHALG_SHA224 0x00000000
|
||||
#define HASHALG_SHA256 0x00000001
|
||||
#define HASHALG_SHA384 0x00000002
|
||||
#define HASHALG_SHA512 0x00000003
|
||||
#define HASHALG_RAW 0x00000004
|
||||
#define HASHALG_MAX 0x00000004
|
||||
|
||||
//
|
||||
// Certificate public key minimum size (bytes)
|
||||
//
|
||||
#define CER_PUBKEY_MIN_SIZE 256
|
||||
#define CER_PUBKEY_MIN_SIZE 256
|
||||
|
||||
//
|
||||
// Types of errors may occur during certificate enrollment.
|
||||
@@ -113,18 +113,18 @@ typedef enum {
|
||||
//
|
||||
Unqualified_Key,
|
||||
Enroll_Error_Max
|
||||
}ENROLL_KEY_ERROR;
|
||||
} ENROLL_KEY_ERROR;
|
||||
|
||||
typedef struct {
|
||||
UINTN Signature;
|
||||
LIST_ENTRY Head;
|
||||
UINTN MenuNumber;
|
||||
UINTN Signature;
|
||||
LIST_ENTRY Head;
|
||||
UINTN MenuNumber;
|
||||
} SECUREBOOT_MENU_OPTION;
|
||||
|
||||
typedef struct {
|
||||
EFI_FILE_HANDLE FHandle;
|
||||
UINT16 *FileName;
|
||||
UINT8 FileType;
|
||||
EFI_FILE_HANDLE FHandle;
|
||||
UINT16 *FileName;
|
||||
UINT8 FileType;
|
||||
} SECUREBOOT_FILE_CONTEXT;
|
||||
|
||||
#define SECUREBOOT_FREE_NON_NULL(Pointer) \
|
||||
@@ -149,11 +149,11 @@ typedef struct {
|
||||
// We define another format of 5th directory entry: security directory
|
||||
//
|
||||
typedef struct {
|
||||
UINT32 Offset; // Offset of certificate
|
||||
UINT32 SizeOfCert; // size of certificate appended
|
||||
UINT32 Offset; // Offset of certificate
|
||||
UINT32 SizeOfCert; // size of certificate appended
|
||||
} EFI_IMAGE_SECURITY_DATA_DIRECTORY;
|
||||
|
||||
typedef enum{
|
||||
typedef enum {
|
||||
ImageType_IA32,
|
||||
ImageType_X64
|
||||
} IMAGE_TYPE;
|
||||
@@ -162,8 +162,8 @@ typedef enum{
|
||||
/// HII specific Vendor Device Path definition.
|
||||
///
|
||||
typedef struct {
|
||||
VENDOR_DEVICE_PATH VendorDevicePath;
|
||||
EFI_DEVICE_PATH_PROTOCOL End;
|
||||
VENDOR_DEVICE_PATH VendorDevicePath;
|
||||
EFI_DEVICE_PATH_PROTOCOL End;
|
||||
} HII_VENDOR_DEVICE_PATH;
|
||||
|
||||
typedef enum {
|
||||
@@ -177,7 +177,7 @@ typedef enum {
|
||||
Delete_Signature_List_All,
|
||||
Delete_Signature_List_One,
|
||||
Delete_Signature_Data
|
||||
}SIGNATURE_DELETE_TYPE;
|
||||
} SIGNATURE_DELETE_TYPE;
|
||||
|
||||
typedef struct {
|
||||
UINTN Signature;
|
||||
@@ -196,10 +196,10 @@ typedef struct {
|
||||
BOOLEAN *CheckArray; // Record which signature data checked.
|
||||
} SECUREBOOT_CONFIG_PRIVATE_DATA;
|
||||
|
||||
extern SECUREBOOT_CONFIG_PRIVATE_DATA mSecureBootConfigPrivateDateTemplate;
|
||||
extern SECUREBOOT_CONFIG_PRIVATE_DATA *gSecureBootPrivateData;
|
||||
extern SECUREBOOT_CONFIG_PRIVATE_DATA mSecureBootConfigPrivateDateTemplate;
|
||||
extern SECUREBOOT_CONFIG_PRIVATE_DATA *gSecureBootPrivateData;
|
||||
|
||||
#define SECUREBOOT_CONFIG_PRIVATE_DATA_SIGNATURE SIGNATURE_32 ('S', 'E', 'C', 'B')
|
||||
#define SECUREBOOT_CONFIG_PRIVATE_DATA_SIGNATURE SIGNATURE_32 ('S', 'E', 'C', 'B')
|
||||
#define SECUREBOOT_CONFIG_PRIVATE_FROM_THIS(a) CR (a, SECUREBOOT_CONFIG_PRIVATE_DATA, ConfigAccess, SECUREBOOT_CONFIG_PRIVATE_DATA_SIGNATURE)
|
||||
|
||||
//
|
||||
@@ -207,16 +207,15 @@ extern SECUREBOOT_CONFIG_PRIVATE_DATA *gSecureBootPrivateData;
|
||||
//
|
||||
#pragma pack(1)
|
||||
typedef struct _CPL_KEY_INFO {
|
||||
UINT32 KeyLengthInBits; // Key Length In Bits
|
||||
UINT32 BlockSize; // Operation Block Size in Bytes
|
||||
UINT32 CipherBlockSize; // Output Cipher Block Size in Bytes
|
||||
UINT32 KeyType; // Key Type
|
||||
UINT32 CipherMode; // Cipher Mode for Symmetric Algorithm
|
||||
UINT32 Flags; // Additional Key Property Flags
|
||||
UINT32 KeyLengthInBits; // Key Length In Bits
|
||||
UINT32 BlockSize; // Operation Block Size in Bytes
|
||||
UINT32 CipherBlockSize; // Output Cipher Block Size in Bytes
|
||||
UINT32 KeyType; // Key Type
|
||||
UINT32 CipherMode; // Cipher Mode for Symmetric Algorithm
|
||||
UINT32 Flags; // Additional Key Property Flags
|
||||
} CPL_KEY_INFO;
|
||||
#pragma pack()
|
||||
|
||||
|
||||
/**
|
||||
Retrieves the size, in bytes, of the context buffer required for hash operations.
|
||||
|
||||
@@ -247,7 +246,6 @@ BOOLEAN
|
||||
IN OUT VOID *HashContext
|
||||
);
|
||||
|
||||
|
||||
/**
|
||||
Performs digest on a data buffer of the specified length. This function can
|
||||
be called multiple times to compute the digest of long or discontinuous data streams.
|
||||
@@ -308,11 +306,10 @@ typedef struct {
|
||||
} HASH_TABLE;
|
||||
|
||||
typedef struct {
|
||||
WIN_CERTIFICATE Hdr;
|
||||
UINT8 CertData[1];
|
||||
WIN_CERTIFICATE Hdr;
|
||||
UINT8 CertData[1];
|
||||
} WIN_CERTIFICATE_EFI_PKCS;
|
||||
|
||||
|
||||
/**
|
||||
This function publish the SecureBoot configuration Form.
|
||||
|
||||
@@ -328,7 +325,6 @@ InstallSecureBootConfigForm (
|
||||
IN OUT SECUREBOOT_CONFIG_PRIVATE_DATA *PrivateData
|
||||
);
|
||||
|
||||
|
||||
/**
|
||||
This function removes SecureBoot configuration Form.
|
||||
|
||||
@@ -337,10 +333,9 @@ InstallSecureBootConfigForm (
|
||||
**/
|
||||
VOID
|
||||
UninstallSecureBootConfigForm (
|
||||
IN OUT SECUREBOOT_CONFIG_PRIVATE_DATA *PrivateData
|
||||
IN OUT SECUREBOOT_CONFIG_PRIVATE_DATA *PrivateData
|
||||
);
|
||||
|
||||
|
||||
/**
|
||||
This function allows a caller to extract the current configuration for one
|
||||
or more named elements from the target driver.
|
||||
@@ -370,13 +365,12 @@ UninstallSecureBootConfigForm (
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
SecureBootExtractConfig (
|
||||
IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This,
|
||||
IN CONST EFI_STRING Request,
|
||||
OUT EFI_STRING *Progress,
|
||||
OUT EFI_STRING *Results
|
||||
IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This,
|
||||
IN CONST EFI_STRING Request,
|
||||
OUT EFI_STRING *Progress,
|
||||
OUT EFI_STRING *Results
|
||||
);
|
||||
|
||||
|
||||
/**
|
||||
This function processes the results of changes in configuration.
|
||||
|
||||
@@ -398,12 +392,11 @@ SecureBootExtractConfig (
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
SecureBootRouteConfig (
|
||||
IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This,
|
||||
IN CONST EFI_STRING Configuration,
|
||||
OUT EFI_STRING *Progress
|
||||
IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This,
|
||||
IN CONST EFI_STRING Configuration,
|
||||
OUT EFI_STRING *Progress
|
||||
);
|
||||
|
||||
|
||||
/**
|
||||
This function processes the results of changes in configuration.
|
||||
|
||||
@@ -429,15 +422,14 @@ SecureBootRouteConfig (
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
SecureBootCallback (
|
||||
IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This,
|
||||
IN EFI_BROWSER_ACTION Action,
|
||||
IN EFI_QUESTION_ID QuestionId,
|
||||
IN UINT8 Type,
|
||||
IN EFI_IFR_TYPE_VALUE *Value,
|
||||
OUT EFI_BROWSER_ACTION_REQUEST *ActionRequest
|
||||
IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This,
|
||||
IN EFI_BROWSER_ACTION Action,
|
||||
IN EFI_QUESTION_ID QuestionId,
|
||||
IN UINT8 Type,
|
||||
IN EFI_IFR_TYPE_VALUE *Value,
|
||||
OUT EFI_BROWSER_ACTION_REQUEST *ActionRequest
|
||||
);
|
||||
|
||||
|
||||
/**
|
||||
This function converts an input device structure to a Unicode string.
|
||||
|
||||
@@ -449,10 +441,9 @@ SecureBootCallback (
|
||||
CHAR16 *
|
||||
EFIAPI
|
||||
DevicePathToStr (
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *DevPath
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *DevPath
|
||||
);
|
||||
|
||||
|
||||
/**
|
||||
Clean up the dynamic opcode at label and form specified by both LabelId.
|
||||
|
||||
@@ -462,11 +453,10 @@ DevicePathToStr (
|
||||
**/
|
||||
VOID
|
||||
CleanUpPage (
|
||||
IN UINT16 LabelId,
|
||||
IN SECUREBOOT_CONFIG_PRIVATE_DATA *PrivateData
|
||||
IN UINT16 LabelId,
|
||||
IN SECUREBOOT_CONFIG_PRIVATE_DATA *PrivateData
|
||||
);
|
||||
|
||||
|
||||
/**
|
||||
Read file content into BufferPtr, the size of the allocate buffer
|
||||
is *FileSize plus AdditionAllocateSize.
|
||||
@@ -485,13 +475,12 @@ CleanUpPage (
|
||||
**/
|
||||
EFI_STATUS
|
||||
ReadFileContent (
|
||||
IN EFI_FILE_HANDLE FileHandle,
|
||||
IN OUT VOID **BufferPtr,
|
||||
OUT UINTN *FileSize,
|
||||
IN UINTN AdditionAllocateSize
|
||||
IN EFI_FILE_HANDLE FileHandle,
|
||||
IN OUT VOID **BufferPtr,
|
||||
OUT UINTN *FileSize,
|
||||
IN UINTN AdditionAllocateSize
|
||||
);
|
||||
|
||||
|
||||
/**
|
||||
Close an open file handle.
|
||||
|
||||
@@ -500,10 +489,9 @@ ReadFileContent (
|
||||
**/
|
||||
VOID
|
||||
CloseFile (
|
||||
IN EFI_FILE_HANDLE FileHandle
|
||||
IN EFI_FILE_HANDLE FileHandle
|
||||
);
|
||||
|
||||
|
||||
/**
|
||||
Converts a nonnegative integer to an octet string of a specified length.
|
||||
|
||||
@@ -521,10 +509,10 @@ Returns:
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
Int2OctStr (
|
||||
IN CONST UINTN *Integer,
|
||||
IN UINTN IntSizeInWords,
|
||||
OUT UINT8 *OctetString,
|
||||
IN UINTN OSSizeInBytes
|
||||
IN CONST UINTN *Integer,
|
||||
IN UINTN IntSizeInWords,
|
||||
OUT UINT8 *OctetString,
|
||||
IN UINTN OSSizeInBytes
|
||||
);
|
||||
|
||||
/**
|
||||
@@ -555,7 +543,7 @@ GuidToString (
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
UpdatePKFromFile (
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FilePath
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FilePath
|
||||
);
|
||||
|
||||
/**
|
||||
@@ -569,7 +557,7 @@ UpdatePKFromFile (
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
UpdateKEKFromFile (
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FilePath
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FilePath
|
||||
);
|
||||
|
||||
/**
|
||||
@@ -583,7 +571,7 @@ UpdateKEKFromFile (
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
UpdateDBFromFile (
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FilePath
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FilePath
|
||||
);
|
||||
|
||||
/**
|
||||
@@ -597,7 +585,7 @@ UpdateDBFromFile (
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
UpdateDBXFromFile (
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FilePath
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FilePath
|
||||
);
|
||||
|
||||
/**
|
||||
@@ -611,7 +599,7 @@ UpdateDBXFromFile (
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
UpdateDBTFromFile (
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FilePath
|
||||
IN EFI_DEVICE_PATH_PROTOCOL *FilePath
|
||||
);
|
||||
|
||||
#endif
|
||||
|
@@ -26,17 +26,17 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
**/
|
||||
EFI_STATUS
|
||||
ReadFileContent (
|
||||
IN EFI_FILE_HANDLE FileHandle,
|
||||
IN OUT VOID **BufferPtr,
|
||||
OUT UINTN *FileSize,
|
||||
IN UINTN AdditionAllocateSize
|
||||
IN EFI_FILE_HANDLE FileHandle,
|
||||
IN OUT VOID **BufferPtr,
|
||||
OUT UINTN *FileSize,
|
||||
IN UINTN AdditionAllocateSize
|
||||
)
|
||||
|
||||
{
|
||||
UINTN BufferSize;
|
||||
UINT64 SourceFileSize;
|
||||
VOID *Buffer;
|
||||
EFI_STATUS Status;
|
||||
UINTN BufferSize;
|
||||
UINT64 SourceFileSize;
|
||||
VOID *Buffer;
|
||||
EFI_STATUS Status;
|
||||
|
||||
if ((FileHandle == NULL) || (FileSize == NULL)) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
@@ -47,7 +47,7 @@ ReadFileContent (
|
||||
//
|
||||
// Get the file size
|
||||
//
|
||||
Status = FileHandle->SetPosition (FileHandle, (UINT64) -1);
|
||||
Status = FileHandle->SetPosition (FileHandle, (UINT64)-1);
|
||||
if (EFI_ERROR (Status)) {
|
||||
goto ON_EXIT;
|
||||
}
|
||||
@@ -62,20 +62,20 @@ ReadFileContent (
|
||||
goto ON_EXIT;
|
||||
}
|
||||
|
||||
BufferSize = (UINTN) SourceFileSize + AdditionAllocateSize;
|
||||
Buffer = AllocateZeroPool(BufferSize);
|
||||
BufferSize = (UINTN)SourceFileSize + AdditionAllocateSize;
|
||||
Buffer = AllocateZeroPool (BufferSize);
|
||||
if (Buffer == NULL) {
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
|
||||
BufferSize = (UINTN) SourceFileSize;
|
||||
BufferSize = (UINTN)SourceFileSize;
|
||||
*FileSize = BufferSize;
|
||||
|
||||
Status = FileHandle->Read (FileHandle, &BufferSize, Buffer);
|
||||
if (EFI_ERROR (Status) || BufferSize != *FileSize) {
|
||||
if (EFI_ERROR (Status) || (BufferSize != *FileSize)) {
|
||||
FreePool (Buffer);
|
||||
Buffer = NULL;
|
||||
Status = EFI_BAD_BUFFER_SIZE;
|
||||
Status = EFI_BAD_BUFFER_SIZE;
|
||||
goto ON_EXIT;
|
||||
}
|
||||
|
||||
@@ -93,7 +93,7 @@ ON_EXIT:
|
||||
**/
|
||||
VOID
|
||||
CloseFile (
|
||||
IN EFI_FILE_HANDLE FileHandle
|
||||
IN EFI_FILE_HANDLE FileHandle
|
||||
)
|
||||
{
|
||||
if (FileHandle != NULL) {
|
||||
@@ -118,10 +118,10 @@ Returns:
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
Int2OctStr (
|
||||
IN CONST UINTN *Integer,
|
||||
IN UINTN IntSizeInWords,
|
||||
OUT UINT8 *OctetString,
|
||||
IN UINTN OSSizeInBytes
|
||||
IN CONST UINTN *Integer,
|
||||
IN UINTN IntSizeInWords,
|
||||
OUT UINT8 *OctetString,
|
||||
IN UINTN OSSizeInBytes
|
||||
)
|
||||
{
|
||||
CONST UINT8 *Ptr1;
|
||||
@@ -129,11 +129,13 @@ Int2OctStr (
|
||||
|
||||
for (Ptr1 = (CONST UINT8 *)Integer, Ptr2 = OctetString + OSSizeInBytes - 1;
|
||||
Ptr1 < (UINT8 *)(Integer + IntSizeInWords) && Ptr2 >= OctetString;
|
||||
Ptr1++, Ptr2--) {
|
||||
Ptr1++, Ptr2--)
|
||||
{
|
||||
*Ptr2 = *Ptr1;
|
||||
}
|
||||
|
||||
for (; Ptr1 < (CONST UINT8 *)(Integer + IntSizeInWords) && *Ptr1 == 0; Ptr1++);
|
||||
for ( ; Ptr1 < (CONST UINT8 *)(Integer + IntSizeInWords) && *Ptr1 == 0; Ptr1++) {
|
||||
}
|
||||
|
||||
if (Ptr1 < (CONST UINT8 *)(Integer + IntSizeInWords)) {
|
||||
return EFI_BUFFER_TOO_SMALL;
|
||||
@@ -163,24 +165,24 @@ GuidToString (
|
||||
IN UINTN BufferSize
|
||||
)
|
||||
{
|
||||
UINTN Size;
|
||||
UINTN Size;
|
||||
|
||||
Size = UnicodeSPrint (
|
||||
Buffer,
|
||||
BufferSize,
|
||||
L"%08x-%04x-%04x-%02x%02x-%02x%02x%02x%02x%02x%02x",
|
||||
(UINTN)Guid->Data1,
|
||||
(UINTN)Guid->Data2,
|
||||
(UINTN)Guid->Data3,
|
||||
(UINTN)Guid->Data4[0],
|
||||
(UINTN)Guid->Data4[1],
|
||||
(UINTN)Guid->Data4[2],
|
||||
(UINTN)Guid->Data4[3],
|
||||
(UINTN)Guid->Data4[4],
|
||||
(UINTN)Guid->Data4[5],
|
||||
(UINTN)Guid->Data4[6],
|
||||
(UINTN)Guid->Data4[7]
|
||||
);
|
||||
Buffer,
|
||||
BufferSize,
|
||||
L"%08x-%04x-%04x-%02x%02x-%02x%02x%02x%02x%02x%02x",
|
||||
(UINTN)Guid->Data1,
|
||||
(UINTN)Guid->Data2,
|
||||
(UINTN)Guid->Data3,
|
||||
(UINTN)Guid->Data4[0],
|
||||
(UINTN)Guid->Data4[1],
|
||||
(UINTN)Guid->Data4[2],
|
||||
(UINTN)Guid->Data4[3],
|
||||
(UINTN)Guid->Data4[4],
|
||||
(UINTN)Guid->Data4[5],
|
||||
(UINTN)Guid->Data4[6],
|
||||
(UINTN)Guid->Data4[7]
|
||||
);
|
||||
|
||||
//
|
||||
// SPrint will null terminate the string. The -1 skips the null
|
||||
|
@@ -15,128 +15,128 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
//
|
||||
// Used by VFR for form or button identification
|
||||
//
|
||||
#define SECUREBOOT_CONFIGURATION_VARSTORE_ID 0x0001
|
||||
#define SECUREBOOT_CONFIGURATION_FORM_ID 0x01
|
||||
#define FORMID_SECURE_BOOT_OPTION_FORM 0x02
|
||||
#define FORMID_SECURE_BOOT_PK_OPTION_FORM 0x03
|
||||
#define FORMID_SECURE_BOOT_KEK_OPTION_FORM 0x04
|
||||
#define FORMID_SECURE_BOOT_DB_OPTION_FORM 0x05
|
||||
#define FORMID_SECURE_BOOT_DBX_OPTION_FORM 0x06
|
||||
#define FORMID_ENROLL_PK_FORM 0x07
|
||||
#define SECUREBOOT_ADD_PK_FILE_FORM_ID 0x08
|
||||
#define FORMID_ENROLL_KEK_FORM 0x09
|
||||
#define FORMID_DELETE_KEK_FORM 0x0a
|
||||
#define SECUREBOOT_ENROLL_SIGNATURE_TO_DB 0x0b
|
||||
#define SECUREBOOT_DELETE_SIGNATURE_FROM_DB 0x0c
|
||||
#define SECUREBOOT_ENROLL_SIGNATURE_TO_DBX 0x0d
|
||||
#define FORMID_SECURE_BOOT_DBT_OPTION_FORM 0x14
|
||||
#define SECUREBOOT_ENROLL_SIGNATURE_TO_DBT 0x15
|
||||
#define SECUREBOOT_DELETE_SIGNATURE_FROM_DBT 0x16
|
||||
#define SECUREBOOT_DELETE_SIGNATURE_LIST_FORM 0x17
|
||||
#define SECUREBOOT_DELETE_SIGNATURE_DATA_FORM 0x18
|
||||
#define SECUREBOOT_CONFIGURATION_VARSTORE_ID 0x0001
|
||||
#define SECUREBOOT_CONFIGURATION_FORM_ID 0x01
|
||||
#define FORMID_SECURE_BOOT_OPTION_FORM 0x02
|
||||
#define FORMID_SECURE_BOOT_PK_OPTION_FORM 0x03
|
||||
#define FORMID_SECURE_BOOT_KEK_OPTION_FORM 0x04
|
||||
#define FORMID_SECURE_BOOT_DB_OPTION_FORM 0x05
|
||||
#define FORMID_SECURE_BOOT_DBX_OPTION_FORM 0x06
|
||||
#define FORMID_ENROLL_PK_FORM 0x07
|
||||
#define SECUREBOOT_ADD_PK_FILE_FORM_ID 0x08
|
||||
#define FORMID_ENROLL_KEK_FORM 0x09
|
||||
#define FORMID_DELETE_KEK_FORM 0x0a
|
||||
#define SECUREBOOT_ENROLL_SIGNATURE_TO_DB 0x0b
|
||||
#define SECUREBOOT_DELETE_SIGNATURE_FROM_DB 0x0c
|
||||
#define SECUREBOOT_ENROLL_SIGNATURE_TO_DBX 0x0d
|
||||
#define FORMID_SECURE_BOOT_DBT_OPTION_FORM 0x14
|
||||
#define SECUREBOOT_ENROLL_SIGNATURE_TO_DBT 0x15
|
||||
#define SECUREBOOT_DELETE_SIGNATURE_FROM_DBT 0x16
|
||||
#define SECUREBOOT_DELETE_SIGNATURE_LIST_FORM 0x17
|
||||
#define SECUREBOOT_DELETE_SIGNATURE_DATA_FORM 0x18
|
||||
|
||||
#define SECURE_BOOT_MODE_CUSTOM 0x01
|
||||
#define SECURE_BOOT_MODE_STANDARD 0x00
|
||||
#define SECURE_BOOT_MODE_CUSTOM 0x01
|
||||
#define SECURE_BOOT_MODE_STANDARD 0x00
|
||||
|
||||
#define KEY_SECURE_BOOT_ENABLE 0x1000
|
||||
#define KEY_SECURE_BOOT_MODE 0x1001
|
||||
#define KEY_VALUE_SAVE_AND_EXIT_DB 0x1002
|
||||
#define KEY_VALUE_NO_SAVE_AND_EXIT_DB 0x1003
|
||||
#define KEY_VALUE_SAVE_AND_EXIT_PK 0x1004
|
||||
#define KEY_VALUE_NO_SAVE_AND_EXIT_PK 0x1005
|
||||
#define KEY_VALUE_SAVE_AND_EXIT_KEK 0x1008
|
||||
#define KEY_VALUE_NO_SAVE_AND_EXIT_KEK 0x1009
|
||||
#define KEY_VALUE_SAVE_AND_EXIT_DBX 0x100a
|
||||
#define KEY_VALUE_NO_SAVE_AND_EXIT_DBX 0x100b
|
||||
#define KEY_HIDE_SECURE_BOOT 0x100c
|
||||
#define KEY_VALUE_SAVE_AND_EXIT_DBT 0x100d
|
||||
#define KEY_VALUE_NO_SAVE_AND_EXIT_DBT 0x100e
|
||||
#define KEY_SECURE_BOOT_ENABLE 0x1000
|
||||
#define KEY_SECURE_BOOT_MODE 0x1001
|
||||
#define KEY_VALUE_SAVE_AND_EXIT_DB 0x1002
|
||||
#define KEY_VALUE_NO_SAVE_AND_EXIT_DB 0x1003
|
||||
#define KEY_VALUE_SAVE_AND_EXIT_PK 0x1004
|
||||
#define KEY_VALUE_NO_SAVE_AND_EXIT_PK 0x1005
|
||||
#define KEY_VALUE_SAVE_AND_EXIT_KEK 0x1008
|
||||
#define KEY_VALUE_NO_SAVE_AND_EXIT_KEK 0x1009
|
||||
#define KEY_VALUE_SAVE_AND_EXIT_DBX 0x100a
|
||||
#define KEY_VALUE_NO_SAVE_AND_EXIT_DBX 0x100b
|
||||
#define KEY_HIDE_SECURE_BOOT 0x100c
|
||||
#define KEY_VALUE_SAVE_AND_EXIT_DBT 0x100d
|
||||
#define KEY_VALUE_NO_SAVE_AND_EXIT_DBT 0x100e
|
||||
|
||||
#define KEY_VALUE_FROM_DBX_TO_LIST_FORM 0x100f
|
||||
#define KEY_VALUE_FROM_DBX_TO_LIST_FORM 0x100f
|
||||
|
||||
#define KEY_SECURE_BOOT_RESET_TO_DEFAULT 0x1010
|
||||
#define KEY_SECURE_BOOT_RESET_TO_DEFAULT 0x1010
|
||||
|
||||
#define KEY_SECURE_BOOT_OPTION 0x1100
|
||||
#define KEY_SECURE_BOOT_PK_OPTION 0x1101
|
||||
#define KEY_SECURE_BOOT_KEK_OPTION 0x1102
|
||||
#define KEY_SECURE_BOOT_DB_OPTION 0x1103
|
||||
#define KEY_SECURE_BOOT_DBX_OPTION 0x1104
|
||||
#define KEY_SECURE_BOOT_DELETE_PK 0x1105
|
||||
#define KEY_ENROLL_PK 0x1106
|
||||
#define KEY_ENROLL_KEK 0x1107
|
||||
#define KEY_DELETE_KEK 0x1108
|
||||
#define KEY_SECURE_BOOT_KEK_GUID 0x110a
|
||||
#define KEY_SECURE_BOOT_SIGNATURE_GUID_DB 0x110b
|
||||
#define KEY_SECURE_BOOT_SIGNATURE_GUID_DBX 0x110c
|
||||
#define KEY_SECURE_BOOT_DBT_OPTION 0x110d
|
||||
#define KEY_SECURE_BOOT_SIGNATURE_GUID_DBT 0x110e
|
||||
#define KEY_SECURE_BOOT_DELETE_ALL_LIST 0x110f
|
||||
#define KEY_SECURE_BOOT_DELETE_ALL_DATA 0x1110
|
||||
#define KEY_SECURE_BOOT_DELETE_CHECK_DATA 0x1111
|
||||
#define KEY_SECURE_BOOT_OPTION 0x1100
|
||||
#define KEY_SECURE_BOOT_PK_OPTION 0x1101
|
||||
#define KEY_SECURE_BOOT_KEK_OPTION 0x1102
|
||||
#define KEY_SECURE_BOOT_DB_OPTION 0x1103
|
||||
#define KEY_SECURE_BOOT_DBX_OPTION 0x1104
|
||||
#define KEY_SECURE_BOOT_DELETE_PK 0x1105
|
||||
#define KEY_ENROLL_PK 0x1106
|
||||
#define KEY_ENROLL_KEK 0x1107
|
||||
#define KEY_DELETE_KEK 0x1108
|
||||
#define KEY_SECURE_BOOT_KEK_GUID 0x110a
|
||||
#define KEY_SECURE_BOOT_SIGNATURE_GUID_DB 0x110b
|
||||
#define KEY_SECURE_BOOT_SIGNATURE_GUID_DBX 0x110c
|
||||
#define KEY_SECURE_BOOT_DBT_OPTION 0x110d
|
||||
#define KEY_SECURE_BOOT_SIGNATURE_GUID_DBT 0x110e
|
||||
#define KEY_SECURE_BOOT_DELETE_ALL_LIST 0x110f
|
||||
#define KEY_SECURE_BOOT_DELETE_ALL_DATA 0x1110
|
||||
#define KEY_SECURE_BOOT_DELETE_CHECK_DATA 0x1111
|
||||
|
||||
#define LABEL_KEK_DELETE 0x1200
|
||||
#define LABEL_DB_DELETE 0x1201
|
||||
#define LABEL_SIGNATURE_LIST_START 0x1202
|
||||
#define LABEL_DBT_DELETE 0x1203
|
||||
#define LABEL_SIGNATURE_DATA_START 0x1204
|
||||
#define LABEL_DELETE_ALL_LIST_BUTTON 0x1300
|
||||
#define LABEL_END 0xffff
|
||||
#define LABEL_KEK_DELETE 0x1200
|
||||
#define LABEL_DB_DELETE 0x1201
|
||||
#define LABEL_SIGNATURE_LIST_START 0x1202
|
||||
#define LABEL_DBT_DELETE 0x1203
|
||||
#define LABEL_SIGNATURE_DATA_START 0x1204
|
||||
#define LABEL_DELETE_ALL_LIST_BUTTON 0x1300
|
||||
#define LABEL_END 0xffff
|
||||
|
||||
#define SECURE_BOOT_MAX_ATTEMPTS_NUM 255
|
||||
#define SECURE_BOOT_MAX_ATTEMPTS_NUM 255
|
||||
|
||||
#define CONFIG_OPTION_OFFSET 0x2000
|
||||
#define CONFIG_OPTION_OFFSET 0x2000
|
||||
|
||||
#define OPTION_CONFIG_QUESTION_ID 0x2000
|
||||
#define OPTION_CONFIG_RANGE 0x1000
|
||||
#define OPTION_CONFIG_QUESTION_ID 0x2000
|
||||
#define OPTION_CONFIG_RANGE 0x1000
|
||||
|
||||
//
|
||||
// Question ID 0x2000 ~ 0x2FFF is for KEK
|
||||
//
|
||||
#define OPTION_DEL_KEK_QUESTION_ID 0x2000
|
||||
#define OPTION_DEL_KEK_QUESTION_ID 0x2000
|
||||
//
|
||||
// Question ID 0x3000 ~ 0x3FFF is for DB
|
||||
//
|
||||
#define OPTION_DEL_DB_QUESTION_ID 0x3000
|
||||
#define OPTION_DEL_DB_QUESTION_ID 0x3000
|
||||
//
|
||||
// Question ID 0x4000 ~ 0x4FFF is for signature list.
|
||||
//
|
||||
#define OPTION_SIGNATURE_LIST_QUESTION_ID 0X4000
|
||||
#define OPTION_SIGNATURE_LIST_QUESTION_ID 0X4000
|
||||
//
|
||||
// Question ID 0x6000 ~ 0x6FFF is for signature data.
|
||||
//
|
||||
#define OPTION_SIGNATURE_DATA_QUESTION_ID 0x6000
|
||||
#define OPTION_SIGNATURE_DATA_QUESTION_ID 0x6000
|
||||
|
||||
//
|
||||
// Question ID 0x5000 ~ 0x5FFF is for DBT
|
||||
//
|
||||
#define OPTION_DEL_DBT_QUESTION_ID 0x5000
|
||||
#define OPTION_DEL_DBT_QUESTION_ID 0x5000
|
||||
|
||||
#define SECURE_BOOT_GUID_SIZE 36
|
||||
#define SECURE_BOOT_GUID_STORAGE_SIZE 37
|
||||
#define SECURE_BOOT_GUID_SIZE 36
|
||||
#define SECURE_BOOT_GUID_STORAGE_SIZE 37
|
||||
|
||||
#define UNKNOWN_FILE_TYPE 0
|
||||
#define X509_CERT_FILE_TYPE 1
|
||||
#define PE_IMAGE_FILE_TYPE 2
|
||||
#define AUTHENTICATION_2_FILE_TYPE 3
|
||||
#define UNKNOWN_FILE_TYPE 0
|
||||
#define X509_CERT_FILE_TYPE 1
|
||||
#define PE_IMAGE_FILE_TYPE 2
|
||||
#define AUTHENTICATION_2_FILE_TYPE 3
|
||||
|
||||
//
|
||||
// Nv Data structure referenced by IFR
|
||||
//
|
||||
typedef struct {
|
||||
BOOLEAN AttemptSecureBoot; // Attempt to enable/disable Secure Boot
|
||||
BOOLEAN HideSecureBoot; // Hidden Attempt Secure Boot
|
||||
CHAR16 SignatureGuid[SECURE_BOOT_GUID_STORAGE_SIZE];
|
||||
BOOLEAN PhysicalPresent; // If a Physical Present User
|
||||
UINT8 SecureBootMode; // Secure Boot Mode: Standard Or Custom
|
||||
BOOLEAN DeletePk;
|
||||
BOOLEAN HasPk; // If Pk is existed it is true
|
||||
BOOLEAN AlwaysRevocation; // If the certificate is always revoked. Revocation time is hidden
|
||||
UINT8 CertificateFormat; // The type of the certificate
|
||||
EFI_HII_DATE RevocationDate; // The revocation date of the certificate
|
||||
EFI_HII_TIME RevocationTime; // The revocation time of the certificate
|
||||
UINT8 FileEnrollType; // File type of signature enroll
|
||||
UINT32 ListCount; // The count of signature list.
|
||||
UINT32 CheckedDataCount; // The count of checked signature data.
|
||||
BOOLEAN AttemptSecureBoot; // Attempt to enable/disable Secure Boot
|
||||
BOOLEAN HideSecureBoot; // Hidden Attempt Secure Boot
|
||||
CHAR16 SignatureGuid[SECURE_BOOT_GUID_STORAGE_SIZE];
|
||||
BOOLEAN PhysicalPresent; // If a Physical Present User
|
||||
UINT8 SecureBootMode; // Secure Boot Mode: Standard Or Custom
|
||||
BOOLEAN DeletePk;
|
||||
BOOLEAN HasPk; // If Pk is existed it is true
|
||||
BOOLEAN AlwaysRevocation; // If the certificate is always revoked. Revocation time is hidden
|
||||
UINT8 CertificateFormat; // The type of the certificate
|
||||
EFI_HII_DATE RevocationDate; // The revocation date of the certificate
|
||||
EFI_HII_TIME RevocationTime; // The revocation time of the certificate
|
||||
UINT8 FileEnrollType; // File type of signature enroll
|
||||
UINT32 ListCount; // The count of signature list.
|
||||
UINT32 CheckedDataCount; // The count of checked signature data.
|
||||
} SECUREBOOT_CONFIGURATION;
|
||||
|
||||
#endif
|
||||
|
Reference in New Issue
Block a user