]> git.proxmox.com Git - mirror_edk2.git/blame - SecurityPkg/Include/Guid/AuthenticatedVariableFormat.h
SecurityPkg: Change EFI_D_INFO to DEBUG_INFO
[mirror_edk2.git] / SecurityPkg / Include / Guid / AuthenticatedVariableFormat.h
CommitLineData
0c18794e 1/** @file\r
7ae77cee 2 The variable data structures are related to EDKII-specific\r
0c18794e 3 implementation of UEFI authenticated variables.\r
7ae77cee
SZ
4 AuthenticatedVariableFormat.h defines variable data headers\r
5 and variable storage region headers that has been moved to\r
6 VariableFormat.h.\r
7\r
8b028036 8Copyright (c) 2009 - 2016, Intel Corporation. All rights reserved.<BR>\r
289b714b 9SPDX-License-Identifier: BSD-2-Clause-Patent\r
0c18794e 10\r
11**/\r
12\r
13#ifndef __AUTHENTICATED_VARIABLE_FORMAT_H__\r
14#define __AUTHENTICATED_VARIABLE_FORMAT_H__\r
15\r
7ae77cee 16#include <Guid/VariableFormat.h>\r
0c18794e 17\r
beda2356 18#define EFI_SECURE_BOOT_ENABLE_DISABLE \\r
19 { 0xf0a30bc7, 0xaf08, 0x4556, { 0x99, 0xc4, 0x0, 0x10, 0x9, 0xc9, 0x3a, 0x44 } }\r
20\r
beda2356 21extern EFI_GUID gEfiSecureBootEnableDisableGuid;\r
c11d47b8 22extern EFI_GUID gEfiCertDbGuid;\r
23extern EFI_GUID gEfiCustomModeEnableGuid;\r
a555940b 24extern EFI_GUID gEfiVendorKeysNvGuid;\r
beda2356 25\r
26///\r
8f8ca22e 27/// "SecureBootEnable" variable for the Secure Boot feature enable/disable.\r
28/// This variable is used for allowing a physically present user to disable\r
29/// Secure Boot via firmware setup without the possession of PKpriv.\r
beda2356 30///\r
7ae77cee
SZ
31/// GUID: gEfiSecureBootEnableDisableGuid\r
32///\r
33/// Format: UINT8\r
34///\r
beda2356 35#define EFI_SECURE_BOOT_ENABLE_NAME L"SecureBootEnable"\r
36#define SECURE_BOOT_ENABLE 1\r
37#define SECURE_BOOT_DISABLE 0\r
0c18794e 38\r
ecc722ad 39///\r
40/// "CustomMode" variable for two Secure Boot modes feature: "Custom" and "Standard".\r
41/// Standard Secure Boot mode is the default mode as UEFI Spec's description.\r
42/// Custom Secure Boot mode allows for more flexibility as specified in the following:\r
43/// Can enroll or delete PK without existing PK's private key.\r
44/// Can enroll or delete KEK without existing PK's private key.\r
45/// Can enroll or delete signature from DB/DBX without KEK's private key.\r
46///\r
7ae77cee
SZ
47/// GUID: gEfiCustomModeEnableGuid\r
48///\r
49/// Format: UINT8\r
50///\r
ecc722ad 51#define EFI_CUSTOM_MODE_NAME L"CustomMode"\r
52#define CUSTOM_SECURE_BOOT_MODE 1\r
53#define STANDARD_SECURE_BOOT_MODE 0\r
54\r
a555940b
FS
55///\r
56/// "VendorKeysNv" variable to record the out of band secure boot keys modification.\r
57/// This variable is a read-only NV varaible that indicates whether someone other than\r
58/// the platform vendor has used a mechanism not defined by the UEFI Specification to\r
59/// transition the system to setup mode or to update secure boot keys.\r
60///\r
7ae77cee
SZ
61/// GUID: gEfiVendorKeysNvGuid\r
62///\r
63/// Format: UINT8\r
64///\r
a555940b
FS
65#define EFI_VENDOR_KEYS_NV_VARIABLE_NAME L"VendorKeysNv"\r
66#define VENDOR_KEYS_VALID 1\r
67#define VENDOR_KEYS_MODIFIED 0\r
68\r
0c18794e 69#endif // __AUTHENTICATED_VARIABLE_FORMAT_H__\r