123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869 |
- /** @file
- The variable data structures are related to EDKII-specific
- implementation of UEFI authenticated variables.
- AuthenticatedVariableFormat.h defines variable data headers
- and variable storage region headers that has been moved to
- VariableFormat.h.
- Copyright (c) 2009 - 2016, Intel Corporation. All rights reserved.<BR>
- SPDX-License-Identifier: BSD-2-Clause-Patent
- **/
- #ifndef __AUTHENTICATED_VARIABLE_FORMAT_H__
- #define __AUTHENTICATED_VARIABLE_FORMAT_H__
- #include <Guid/VariableFormat.h>
- #define EFI_SECURE_BOOT_ENABLE_DISABLE \
- { 0xf0a30bc7, 0xaf08, 0x4556, { 0x99, 0xc4, 0x0, 0x10, 0x9, 0xc9, 0x3a, 0x44 } }
- extern EFI_GUID gEfiSecureBootEnableDisableGuid;
- extern EFI_GUID gEfiCertDbGuid;
- extern EFI_GUID gEfiCustomModeEnableGuid;
- extern EFI_GUID gEfiVendorKeysNvGuid;
- ///
- /// "SecureBootEnable" variable for the Secure Boot feature enable/disable.
- /// This variable is used for allowing a physically present user to disable
- /// Secure Boot via firmware setup without the possession of PKpriv.
- ///
- /// GUID: gEfiSecureBootEnableDisableGuid
- ///
- /// Format: UINT8
- ///
- #define EFI_SECURE_BOOT_ENABLE_NAME L"SecureBootEnable"
- #define SECURE_BOOT_ENABLE 1
- #define SECURE_BOOT_DISABLE 0
- ///
- /// "CustomMode" variable for two Secure Boot modes feature: "Custom" and "Standard".
- /// Standard Secure Boot mode is the default mode as UEFI Spec's description.
- /// Custom Secure Boot mode allows for more flexibility as specified in the following:
- /// Can enroll or delete PK without existing PK's private key.
- /// Can enroll or delete KEK without existing PK's private key.
- /// Can enroll or delete signature from DB/DBX without KEK's private key.
- ///
- /// GUID: gEfiCustomModeEnableGuid
- ///
- /// Format: UINT8
- ///
- #define EFI_CUSTOM_MODE_NAME L"CustomMode"
- #define CUSTOM_SECURE_BOOT_MODE 1
- #define STANDARD_SECURE_BOOT_MODE 0
- ///
- /// "VendorKeysNv" variable to record the out of band secure boot keys modification.
- /// This variable is a read-only NV varaible that indicates whether someone other than
- /// the platform vendor has used a mechanism not defined by the UEFI Specification to
- /// transition the system to setup mode or to update secure boot keys.
- ///
- /// GUID: gEfiVendorKeysNvGuid
- ///
- /// Format: UINT8
- ///
- #define EFI_VENDOR_KEYS_NV_VARIABLE_NAME L"VendorKeysNv"
- #define VENDOR_KEYS_VALID 1
- #define VENDOR_KEYS_MODIFIED 0
- #endif // __AUTHENTICATED_VARIABLE_FORMAT_H__
|