REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3737 Apply uncrustify changes to .c/.h files in the SecurityPkg package Cc: Andrew Fish <afish@apple.com> Cc: Leif Lindholm <leif@nuviainc.com> Cc: Michael D Kinney <michael.d.kinney@intel.com> Signed-off-by: Michael Kubacki <michael.kubacki@microsoft.com> Reviewed-by: Jian J Wang <jian.j.wang@intel.com>
		
			
				
	
	
		
			36 lines
		
	
	
		
			1.1 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			36 lines
		
	
	
		
			1.1 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /** @file
 | |
|   Provides a secure platform-specific method to detect physically present user.
 | |
| 
 | |
| Copyright (c) 2011 - 2018, Intel Corporation. All rights reserved.<BR>
 | |
| SPDX-License-Identifier: BSD-2-Clause-Patent
 | |
| 
 | |
| **/
 | |
| 
 | |
| #ifndef __PLATFORM_SECURE_LIB_H__
 | |
| #define __PLATFORM_SECURE_LIB_H__
 | |
| 
 | |
| /**
 | |
| 
 | |
|   This function provides a platform-specific method to detect whether the platform
 | |
|   is operating by a physically present user.
 | |
| 
 | |
|   Programmatic changing of platform security policy (such as disable Secure Boot,
 | |
|   or switch between Standard/Custom Secure Boot mode) MUST NOT be possible during
 | |
|   Boot Services or after exiting EFI Boot Services. Only a physically present user
 | |
|   is allowed to perform these operations.
 | |
| 
 | |
|   NOTE THAT: This function cannot depend on any EFI Variable Service since they are
 | |
|   not available when this function is called in AuthenticateVariable driver.
 | |
| 
 | |
|   @retval  TRUE       The platform is operated by a physically present user.
 | |
|   @retval  FALSE      The platform is NOT operated by a physically present user.
 | |
| 
 | |
| **/
 | |
| BOOLEAN
 | |
| EFIAPI
 | |
| UserPhysicalPresent (
 | |
|   VOID
 | |
|   );
 | |
| 
 | |
| #endif
 |