12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455 |
- /** @file
- Declare the GUID that is expected:
- - as EFI_SIGNATURE_DATA.SignatureOwner GUID in association with X509 and
- RSA2048 Secure Boot certificates issued by/for Microsoft,
- - as UEFI variable vendor GUID in association with (unspecified)
- Microsoft-owned variables.
- Copyright (C) 2014-2019, Red Hat, Inc.
- SPDX-License-Identifier: BSD-2-Clause-Patent
- @par Specification Reference:
- - MSDN: System.Fundamentals.Firmware at
- <https://msdn.microsoft.com/en-us/ie/dn932805(v=vs.94)>.
- **/
- #ifndef MICROSOFT_VENDOR_H_
- #define MICROSOFT_VENDOR_H_
- #include <Uefi/UefiBaseType.h>
- //
- // The following test cases of the Secure Boot Logo Test in the Microsoft
- // Hardware Certification Kit:
- //
- // - Microsoft.UefiSecureBootLogo.Tests.OutOfBoxVerifyMicrosoftKEKpresent
- // - Microsoft.UefiSecureBootLogo.Tests.OutOfBoxConfirmMicrosoftSignatureInDB
- //
- // expect the EFI_SIGNATURE_DATA.SignatureOwner GUID to be
- // 77FA9ABD-0359-4D32-BD60-28F4E78F784B, when the
- // EFI_SIGNATURE_DATA.SignatureData field carries any of the following X509
- // certificates:
- //
- // - "Microsoft Corporation KEK CA 2011" (in KEK)
- // - "Microsoft Windows Production PCA 2011" (in db)
- // - "Microsoft Corporation UEFI CA 2011" (in db)
- //
- // This is despite the fact that the UEFI specification requires
- // EFI_SIGNATURE_DATA.SignatureOwner to reflect the agent (i.e., OS,
- // application or driver) that enrolled and therefore owns
- // EFI_SIGNATURE_DATA.SignatureData, and not the organization that issued
- // EFI_SIGNATURE_DATA.SignatureData.
- //
- #define MICROSOFT_VENDOR_GUID \
- { 0x77fa9abd, \
- 0x0359, \
- 0x4d32, \
- { 0xbd, 0x60, 0x28, 0xf4, 0xe7, 0x8f, 0x78, 0x4b }, \
- }
- extern EFI_GUID gMicrosoftVendorGuid;
- #endif /* MICROSOFT_VENDOR_H_ */
|