REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3737 Apply uncrustify changes to .c/.h files in the SecurityPkg package Cc: Andrew Fish <afish@apple.com> Cc: Leif Lindholm <leif@nuviainc.com> Cc: Michael D Kinney <michael.d.kinney@intel.com> Signed-off-by: Michael Kubacki <michael.kubacki@microsoft.com> Reviewed-by: Jian J Wang <jian.j.wang@intel.com>
		
			
				
	
	
		
			70 lines
		
	
	
		
			2.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			70 lines
		
	
	
		
			2.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /** @file
 | |
|   The variable data structures are related to EDKII-specific
 | |
|   implementation of UEFI authenticated variables.
 | |
|   AuthenticatedVariableFormat.h defines variable data headers
 | |
|   and variable storage region headers that has been moved to
 | |
|   VariableFormat.h.
 | |
| 
 | |
| Copyright (c) 2009 - 2016, Intel Corporation. All rights reserved.<BR>
 | |
| SPDX-License-Identifier: BSD-2-Clause-Patent
 | |
| 
 | |
| **/
 | |
| 
 | |
| #ifndef __AUTHENTICATED_VARIABLE_FORMAT_H__
 | |
| #define __AUTHENTICATED_VARIABLE_FORMAT_H__
 | |
| 
 | |
| #include <Guid/VariableFormat.h>
 | |
| 
 | |
| #define EFI_SECURE_BOOT_ENABLE_DISABLE \
 | |
|   { 0xf0a30bc7, 0xaf08, 0x4556, { 0x99, 0xc4, 0x0, 0x10, 0x9, 0xc9, 0x3a, 0x44 } }
 | |
| 
 | |
| extern EFI_GUID  gEfiSecureBootEnableDisableGuid;
 | |
| extern EFI_GUID  gEfiCertDbGuid;
 | |
| extern EFI_GUID  gEfiCustomModeEnableGuid;
 | |
| extern EFI_GUID  gEfiVendorKeysNvGuid;
 | |
| 
 | |
| ///
 | |
| /// "SecureBootEnable" variable for the Secure Boot feature enable/disable.
 | |
| /// This variable is used for allowing a physically present user to disable
 | |
| /// Secure Boot via firmware setup without the possession of PKpriv.
 | |
| ///
 | |
| /// GUID: gEfiSecureBootEnableDisableGuid
 | |
| ///
 | |
| /// Format: UINT8
 | |
| ///
 | |
| #define EFI_SECURE_BOOT_ENABLE_NAME  L"SecureBootEnable"
 | |
| #define SECURE_BOOT_ENABLE           1
 | |
| #define SECURE_BOOT_DISABLE          0
 | |
| 
 | |
| ///
 | |
| ///  "CustomMode" variable for two Secure Boot modes feature: "Custom" and "Standard".
 | |
| ///  Standard Secure Boot mode is the default mode as UEFI Spec's description.
 | |
| ///  Custom Secure Boot mode allows for more flexibility as specified in the following:
 | |
| ///    Can enroll or delete PK without existing PK's private key.
 | |
| ///    Can enroll or delete KEK without existing PK's private key.
 | |
| ///    Can enroll or delete signature from DB/DBX without KEK's private key.
 | |
| ///
 | |
| ///  GUID: gEfiCustomModeEnableGuid
 | |
| ///
 | |
| /// Format: UINT8
 | |
| ///
 | |
| #define EFI_CUSTOM_MODE_NAME       L"CustomMode"
 | |
| #define CUSTOM_SECURE_BOOT_MODE    1
 | |
| #define STANDARD_SECURE_BOOT_MODE  0
 | |
| 
 | |
| ///
 | |
| ///  "VendorKeysNv" variable to record the out of band secure boot keys modification.
 | |
| ///  This variable is a read-only NV variable that indicates whether someone other than
 | |
| ///  the platform vendor has used a mechanism not defined by the UEFI Specification to
 | |
| ///  transition the system to setup mode or to update secure boot keys.
 | |
| ///
 | |
| ///  GUID: gEfiVendorKeysNvGuid
 | |
| ///
 | |
| /// Format: UINT8
 | |
| ///
 | |
| #define EFI_VENDOR_KEYS_NV_VARIABLE_NAME  L"VendorKeysNv"
 | |
| #define VENDOR_KEYS_VALID                 1
 | |
| #define VENDOR_KEYS_MODIFIED              0
 | |
| 
 | |
| #endif // __AUTHENTICATED_VARIABLE_FORMAT_H__
 |