REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3737 Apply uncrustify changes to .c/.h files in the SecurityPkg package Cc: Andrew Fish <afish@apple.com> Cc: Leif Lindholm <leif@nuviainc.com> Cc: Michael D Kinney <michael.d.kinney@intel.com> Signed-off-by: Michael Kubacki <michael.kubacki@microsoft.com> Reviewed-by: Jian J Wang <jian.j.wang@intel.com>
		
			
				
	
	
		
			70 lines
		
	
	
		
			2.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			70 lines
		
	
	
		
			2.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/** @file
 | 
						|
  The variable data structures are related to EDKII-specific
 | 
						|
  implementation of UEFI authenticated variables.
 | 
						|
  AuthenticatedVariableFormat.h defines variable data headers
 | 
						|
  and variable storage region headers that has been moved to
 | 
						|
  VariableFormat.h.
 | 
						|
 | 
						|
Copyright (c) 2009 - 2016, Intel Corporation. All rights reserved.<BR>
 | 
						|
SPDX-License-Identifier: BSD-2-Clause-Patent
 | 
						|
 | 
						|
**/
 | 
						|
 | 
						|
#ifndef __AUTHENTICATED_VARIABLE_FORMAT_H__
 | 
						|
#define __AUTHENTICATED_VARIABLE_FORMAT_H__
 | 
						|
 | 
						|
#include <Guid/VariableFormat.h>
 | 
						|
 | 
						|
#define EFI_SECURE_BOOT_ENABLE_DISABLE \
 | 
						|
  { 0xf0a30bc7, 0xaf08, 0x4556, { 0x99, 0xc4, 0x0, 0x10, 0x9, 0xc9, 0x3a, 0x44 } }
 | 
						|
 | 
						|
extern EFI_GUID  gEfiSecureBootEnableDisableGuid;
 | 
						|
extern EFI_GUID  gEfiCertDbGuid;
 | 
						|
extern EFI_GUID  gEfiCustomModeEnableGuid;
 | 
						|
extern EFI_GUID  gEfiVendorKeysNvGuid;
 | 
						|
 | 
						|
///
 | 
						|
/// "SecureBootEnable" variable for the Secure Boot feature enable/disable.
 | 
						|
/// This variable is used for allowing a physically present user to disable
 | 
						|
/// Secure Boot via firmware setup without the possession of PKpriv.
 | 
						|
///
 | 
						|
/// GUID: gEfiSecureBootEnableDisableGuid
 | 
						|
///
 | 
						|
/// Format: UINT8
 | 
						|
///
 | 
						|
#define EFI_SECURE_BOOT_ENABLE_NAME  L"SecureBootEnable"
 | 
						|
#define SECURE_BOOT_ENABLE           1
 | 
						|
#define SECURE_BOOT_DISABLE          0
 | 
						|
 | 
						|
///
 | 
						|
///  "CustomMode" variable for two Secure Boot modes feature: "Custom" and "Standard".
 | 
						|
///  Standard Secure Boot mode is the default mode as UEFI Spec's description.
 | 
						|
///  Custom Secure Boot mode allows for more flexibility as specified in the following:
 | 
						|
///    Can enroll or delete PK without existing PK's private key.
 | 
						|
///    Can enroll or delete KEK without existing PK's private key.
 | 
						|
///    Can enroll or delete signature from DB/DBX without KEK's private key.
 | 
						|
///
 | 
						|
///  GUID: gEfiCustomModeEnableGuid
 | 
						|
///
 | 
						|
/// Format: UINT8
 | 
						|
///
 | 
						|
#define EFI_CUSTOM_MODE_NAME       L"CustomMode"
 | 
						|
#define CUSTOM_SECURE_BOOT_MODE    1
 | 
						|
#define STANDARD_SECURE_BOOT_MODE  0
 | 
						|
 | 
						|
///
 | 
						|
///  "VendorKeysNv" variable to record the out of band secure boot keys modification.
 | 
						|
///  This variable is a read-only NV variable that indicates whether someone other than
 | 
						|
///  the platform vendor has used a mechanism not defined by the UEFI Specification to
 | 
						|
///  transition the system to setup mode or to update secure boot keys.
 | 
						|
///
 | 
						|
///  GUID: gEfiVendorKeysNvGuid
 | 
						|
///
 | 
						|
/// Format: UINT8
 | 
						|
///
 | 
						|
#define EFI_VENDOR_KEYS_NV_VARIABLE_NAME  L"VendorKeysNv"
 | 
						|
#define VENDOR_KEYS_VALID                 1
 | 
						|
#define VENDOR_KEYS_MODIFIED              0
 | 
						|
 | 
						|
#endif // __AUTHENTICATED_VARIABLE_FORMAT_H__
 |