]> git.proxmox.com Git - mirror_edk2.git/blame - SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigImpl.h
SecurityPkg: Use FileExplorerLib in SecureBootConfigDxe
[mirror_edk2.git] / SecurityPkg / VariableAuthenticated / SecureBootConfigDxe / SecureBootConfigImpl.h
CommitLineData
beda2356 1/** @file\r
2 The header file of HII Config Access protocol implementation of SecureBoot\r
3 configuration module.\r
4\r
762d8ddb 5Copyright (c) 2011 - 2016, Intel Corporation. All rights reserved.<BR>\r
bc0c99b3 6This program and the accompanying materials\r
7are licensed and made available under the terms and conditions of the BSD License\r
8which accompanies this distribution. The full text of the license may be found at\r
beda2356 9http://opensource.org/licenses/bsd-license.php\r
10\r
bc0c99b3 11THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
beda2356 12WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
13\r
14**/\r
15\r
16#ifndef __SECUREBOOT_CONFIG_IMPL_H__\r
17#define __SECUREBOOT_CONFIG_IMPL_H__\r
18\r
19#include <Uefi.h>\r
20\r
21#include <Protocol/HiiConfigAccess.h>\r
22#include <Protocol/HiiConfigRouting.h>\r
ecc722ad 23#include <Protocol/SimpleFileSystem.h>\r
24#include <Protocol/BlockIo.h>\r
25#include <Protocol/DevicePath.h>\r
ecc722ad 26#include <Protocol/DebugPort.h>\r
27#include <Protocol/LoadFile.h>\r
beda2356 28\r
29#include <Library/BaseLib.h>\r
30#include <Library/BaseMemoryLib.h>\r
31#include <Library/DebugLib.h>\r
32#include <Library/MemoryAllocationLib.h>\r
33#include <Library/UefiBootServicesTableLib.h>\r
34#include <Library/UefiRuntimeServicesTableLib.h>\r
35#include <Library/UefiHiiServicesLib.h>\r
36#include <Library/UefiLib.h>\r
37#include <Library/HiiLib.h>\r
38#include <Library/DevicePathLib.h>\r
bc0c99b3 39#include <Library/PrintLib.h>\r
ecc722ad 40#include <Library/PlatformSecureLib.h>\r
41#include <Library/BaseCryptLib.h>\r
762d8ddb
DB
42#include <Library/FileExplorerLib.h>\r
43\r
beda2356 44#include <Guid/MdeModuleHii.h>\r
45#include <Guid/AuthenticatedVariableFormat.h>\r
ecc722ad 46#include <Guid/FileSystemVolumeLabelInfo.h>\r
47#include <Guid/ImageAuthentication.h>\r
48#include <Guid/FileInfo.h>\r
beda2356 49\r
50#include "SecureBootConfigNvData.h"\r
51\r
52//\r
53// Tool generated IFR binary data and String package data\r
54//\r
ecc722ad 55extern UINT8 SecureBootConfigBin[];\r
56extern UINT8 SecureBootConfigDxeStrings[];\r
57\r
58//\r
59// Shared IFR form update data\r
60//\r
61extern VOID *mStartOpCodeHandle;\r
62extern VOID *mEndOpCodeHandle;\r
63extern EFI_IFR_GUID_LABEL *mStartLabel;\r
64extern EFI_IFR_GUID_LABEL *mEndLabel;\r
65\r
66#define MAX_CHAR 480\r
67#define TWO_BYTE_ENCODE 0x82\r
68\r
69//\r
70// SHA-1 digest size in bytes.\r
71//\r
72#define SHA1_DIGEST_SIZE 20\r
73//\r
74// SHA-256 digest size in bytes\r
75//\r
76#define SHA256_DIGEST_SIZE 32\r
77//\r
20333c6d 78// SHA-384 digest size in bytes\r
ecc722ad 79//\r
20333c6d
QL
80#define SHA384_DIGEST_SIZE 48\r
81//\r
82// SHA-512 digest size in bytes\r
83//\r
84#define SHA512_DIGEST_SIZE 64\r
85\r
86//\r
87// Set max digest size as SHA512 Output (64 bytes) by far\r
88//\r
89#define MAX_DIGEST_SIZE SHA512_DIGEST_SIZE\r
ecc722ad 90\r
91#define WIN_CERT_UEFI_RSA2048_SIZE 256\r
92\r
93//\r
94// Support hash types\r
95//\r
96#define HASHALG_SHA1 0x00000000\r
97#define HASHALG_SHA224 0x00000001\r
98#define HASHALG_SHA256 0x00000002\r
99#define HASHALG_SHA384 0x00000003\r
100#define HASHALG_SHA512 0x00000004\r
20333c6d 101#define HASHALG_RAW 0x00000005\r
ecc722ad 102#define HASHALG_MAX 0x00000005\r
103\r
104\r
105#define SECUREBOOT_MENU_OPTION_SIGNATURE SIGNATURE_32 ('S', 'b', 'M', 'u')\r
106#define SECUREBOOT_MENU_ENTRY_SIGNATURE SIGNATURE_32 ('S', 'b', 'M', 'r')\r
107\r
108typedef struct {\r
109 EFI_DEVICE_PATH_PROTOCOL Header;\r
110 EFI_GUID Guid;\r
111 UINT8 VendorDefinedData[1];\r
112} VENDOR_DEVICE_PATH_WITH_DATA;\r
113\r
114typedef struct {\r
115 EFI_DEVICE_PATH_PROTOCOL Header;\r
116 UINT16 NetworkProtocol;\r
117 UINT16 LoginOption;\r
118 UINT64 Lun;\r
119 UINT16 TargetPortalGroupTag;\r
120 CHAR16 TargetName[1];\r
121} ISCSI_DEVICE_PATH_WITH_NAME;\r
122\r
ecc722ad 123typedef struct {\r
124 CHAR16 *Str;\r
125 UINTN Len;\r
126 UINTN Maxlen;\r
127} POOL_PRINT;\r
128\r
129typedef\r
130VOID\r
131(*DEV_PATH_FUNCTION) (\r
132 IN OUT POOL_PRINT *Str,\r
133 IN VOID *DevPath\r
134 );\r
135\r
136typedef struct {\r
137 UINT8 Type;\r
138 UINT8 SubType;\r
139 DEV_PATH_FUNCTION Function;\r
140} DEVICE_PATH_STRING_TABLE;\r
141\r
142typedef struct {\r
143 UINTN Signature;\r
144 LIST_ENTRY Head;\r
145 UINTN MenuNumber;\r
146} SECUREBOOT_MENU_OPTION;\r
147\r
ecc722ad 148typedef struct {\r
ecc722ad 149 EFI_FILE_HANDLE FHandle;\r
150 UINT16 *FileName;\r
ecc722ad 151} SECUREBOOT_FILE_CONTEXT;\r
152\r
153\r
154//\r
155// We define another format of 5th directory entry: security directory\r
156//\r
157typedef struct {\r
158 UINT32 Offset; // Offset of certificate\r
159 UINT32 SizeOfCert; // size of certificate appended\r
160} EFI_IMAGE_SECURITY_DATA_DIRECTORY;\r
161\r
162typedef enum{\r
163 ImageType_IA32,\r
164 ImageType_X64\r
165} IMAGE_TYPE;\r
beda2356 166\r
167///\r
168/// HII specific Vendor Device Path definition.\r
169///\r
170typedef struct {\r
171 VENDOR_DEVICE_PATH VendorDevicePath;\r
172 EFI_DEVICE_PATH_PROTOCOL End;\r
173} HII_VENDOR_DEVICE_PATH;\r
174\r
175typedef struct {\r
176 UINTN Signature;\r
177\r
178 EFI_HII_CONFIG_ACCESS_PROTOCOL ConfigAccess;\r
179 EFI_HII_HANDLE HiiHandle;\r
180 EFI_HANDLE DriverHandle;\r
181\r
ecc722ad 182 SECUREBOOT_FILE_CONTEXT *FileContext;\r
183\r
184 EFI_GUID *SignatureGUID;\r
beda2356 185} SECUREBOOT_CONFIG_PRIVATE_DATA;\r
186\r
187extern SECUREBOOT_CONFIG_PRIVATE_DATA mSecureBootConfigPrivateDateTemplate;\r
762d8ddb 188extern SECUREBOOT_CONFIG_PRIVATE_DATA *gSecureBootPrivateData;\r
beda2356 189\r
190#define SECUREBOOT_CONFIG_PRIVATE_DATA_SIGNATURE SIGNATURE_32 ('S', 'E', 'C', 'B')\r
bc0c99b3 191#define SECUREBOOT_CONFIG_PRIVATE_FROM_THIS(a) CR (a, SECUREBOOT_CONFIG_PRIVATE_DATA, ConfigAccess, SECUREBOOT_CONFIG_PRIVATE_DATA_SIGNATURE)\r
192\r
ecc722ad 193//\r
194// Cryptograhpic Key Information\r
195//\r
1413b8e9 196#pragma pack(1)\r
ecc722ad 197typedef struct _CPL_KEY_INFO {\r
198 UINT32 KeyLengthInBits; // Key Length In Bits\r
199 UINT32 BlockSize; // Operation Block Size in Bytes\r
200 UINT32 CipherBlockSize; // Output Cipher Block Size in Bytes\r
201 UINT32 KeyType; // Key Type\r
202 UINT32 CipherMode; // Cipher Mode for Symmetric Algorithm\r
203 UINT32 Flags; // Additional Key Property Flags\r
204} CPL_KEY_INFO;\r
1413b8e9 205#pragma pack()\r
ecc722ad 206\r
207\r
208/**\r
209 Retrieves the size, in bytes, of the context buffer required for hash operations.\r
210\r
211 @return The size, in bytes, of the context buffer required for hash operations.\r
212\r
213**/\r
214typedef\r
215EFI_STATUS\r
216(EFIAPI *HASH_GET_CONTEXT_SIZE)(\r
217 VOID\r
218 );\r
219\r
220/**\r
221 Initializes user-supplied memory pointed by HashContext as hash context for\r
222 subsequent use.\r
223\r
224 If HashContext is NULL, then ASSERT().\r
225\r
226 @param[in, out] HashContext Pointer to Context being initialized.\r
227\r
228 @retval TRUE HASH context initialization succeeded.\r
229 @retval FALSE HASH context initialization failed.\r
230\r
231**/\r
232typedef\r
233BOOLEAN\r
234(EFIAPI *HASH_INIT)(\r
235 IN OUT VOID *HashContext\r
236 );\r
237\r
238\r
239/**\r
240 Performs digest on a data buffer of the specified length. This function can\r
241 be called multiple times to compute the digest of long or discontinuous data streams.\r
242\r
243 If HashContext is NULL, then ASSERT().\r
244\r
245 @param[in, out] HashContext Pointer to the MD5 context.\r
246 @param[in] Data Pointer to the buffer containing the data to be hashed.\r
247 @param[in] DataLength Length of Data buffer in bytes.\r
248\r
249 @retval TRUE HASH data digest succeeded.\r
250 @retval FALSE Invalid HASH context. After HashFinal function has been called, the\r
251 HASH context cannot be reused.\r
252\r
253**/\r
254typedef\r
255BOOLEAN\r
256(EFIAPI *HASH_UPDATE)(\r
257 IN OUT VOID *HashContext,\r
258 IN CONST VOID *Data,\r
259 IN UINTN DataLength\r
260 );\r
261\r
262/**\r
263 Completes hash computation and retrieves the digest value into the specified\r
264 memory. After this function has been called, the context cannot be used again.\r
265\r
266 If HashContext is NULL, then ASSERT().\r
267 If HashValue is NULL, then ASSERT().\r
268\r
269 @param[in, out] HashContext Pointer to the MD5 context\r
270 @param[out] HashValue Pointer to a buffer that receives the HASH digest\r
271 value (16 bytes).\r
272\r
273 @retval TRUE HASH digest computation succeeded.\r
274 @retval FALSE HASH digest computation failed.\r
275\r
276**/\r
277typedef\r
278BOOLEAN\r
279(EFIAPI *HASH_FINAL)(\r
280 IN OUT VOID *HashContext,\r
281 OUT UINT8 *HashValue\r
282 );\r
283\r
284//\r
285// Hash Algorithm Table\r
286//\r
287typedef struct {\r
288 CHAR16 *Name; ///< Name for Hash Algorithm\r
289 UINTN DigestLength; ///< Digest Length\r
20333c6d 290 UINT8 *OidValue; ///< Hash Algorithm OID ASN.1 Value\r
ecc722ad 291 UINTN OidLength; ///< Length of Hash OID Value\r
292 HASH_GET_CONTEXT_SIZE GetContextSize; ///< Pointer to Hash GetContentSize function\r
293 HASH_INIT HashInit; ///< Pointer to Hash Init function\r
294 HASH_UPDATE HashUpdate; ///< Pointer to Hash Update function\r
295 HASH_FINAL HashFinal; ///< Pointer to Hash Final function\r
296} HASH_TABLE;\r
297\r
298typedef struct {\r
299 WIN_CERTIFICATE Hdr;\r
300 UINT8 CertData[1];\r
301} WIN_CERTIFICATE_EFI_PKCS;\r
302\r
beda2356 303\r
304/**\r
305 This function publish the SecureBoot configuration Form.\r
306\r
307 @param[in, out] PrivateData Points to SecureBoot configuration private data.\r
308\r
ecc722ad 309 @retval EFI_SUCCESS HII Form is installed successfully.\r
beda2356 310 @retval EFI_OUT_OF_RESOURCES Not enough resource for HII Form installation.\r
311 @retval Others Other errors as indicated.\r
312\r
313**/\r
314EFI_STATUS\r
315InstallSecureBootConfigForm (\r
316 IN OUT SECUREBOOT_CONFIG_PRIVATE_DATA *PrivateData\r
317 );\r
318\r
ecc722ad 319\r
beda2356 320/**\r
321 This function removes SecureBoot configuration Form.\r
322\r
323 @param[in, out] PrivateData Points to SecureBoot configuration private data.\r
324\r
325**/\r
beda2356 326VOID\r
327UninstallSecureBootConfigForm (\r
328 IN OUT SECUREBOOT_CONFIG_PRIVATE_DATA *PrivateData\r
329 );\r
330\r
ecc722ad 331\r
beda2356 332/**\r
333 This function allows a caller to extract the current configuration for one\r
334 or more named elements from the target driver.\r
335\r
336 @param[in] This Points to the EFI_HII_CONFIG_ACCESS_PROTOCOL.\r
337 @param[in] Request A null-terminated Unicode string in\r
338 <ConfigRequest> format.\r
339 @param[out] Progress On return, points to a character in the Request\r
340 string. Points to the string's null terminator if\r
341 request was successful. Points to the most recent\r
342 '&' before the first failing name/value pair (or\r
343 the beginning of the string if the failure is in\r
344 the first name/value pair) if the request was not\r
345 successful.\r
346 @param[out] Results A null-terminated Unicode string in\r
347 <ConfigAltResp> format which has all values filled\r
348 in for the names in the Request string. String to\r
349 be allocated by the called function.\r
350\r
351 @retval EFI_SUCCESS The Results is filled with the requested values.\r
352 @retval EFI_OUT_OF_RESOURCES Not enough memory to store the results.\r
353 @retval EFI_INVALID_PARAMETER Request is illegal syntax, or unknown name.\r
354 @retval EFI_NOT_FOUND Routing data doesn't match any storage in this\r
355 driver.\r
356\r
357**/\r
358EFI_STATUS\r
359EFIAPI\r
360SecureBootExtractConfig (\r
361 IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This,\r
362 IN CONST EFI_STRING Request,\r
363 OUT EFI_STRING *Progress,\r
364 OUT EFI_STRING *Results\r
365 );\r
366\r
ecc722ad 367\r
beda2356 368/**\r
369 This function processes the results of changes in configuration.\r
370\r
371 @param[in] This Points to the EFI_HII_CONFIG_ACCESS_PROTOCOL.\r
372 @param[in] Configuration A null-terminated Unicode string in <ConfigResp>\r
373 format.\r
374 @param[out] Progress A pointer to a string filled in with the offset of\r
375 the most recent '&' before the first failing\r
376 name/value pair (or the beginning of the string if\r
377 the failure is in the first name/value pair) or\r
378 the terminating NULL if all was successful.\r
379\r
380 @retval EFI_SUCCESS The Results is processed successfully.\r
381 @retval EFI_INVALID_PARAMETER Configuration is NULL.\r
382 @retval EFI_NOT_FOUND Routing data doesn't match any storage in this\r
383 driver.\r
384\r
385**/\r
386EFI_STATUS\r
387EFIAPI\r
388SecureBootRouteConfig (\r
389 IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This,\r
390 IN CONST EFI_STRING Configuration,\r
391 OUT EFI_STRING *Progress\r
392 );\r
393\r
ecc722ad 394\r
beda2356 395/**\r
396 This function processes the results of changes in configuration.\r
397\r
398 @param[in] This Points to the EFI_HII_CONFIG_ACCESS_PROTOCOL.\r
399 @param[in] Action Specifies the type of action taken by the browser.\r
400 @param[in] QuestionId A unique value which is sent to the original\r
401 exporting driver so that it can identify the type\r
402 of data to expect.\r
403 @param[in] Type The type of value for the question.\r
404 @param[in] Value A pointer to the data being sent to the original\r
405 exporting driver.\r
406 @param[out] ActionRequest On return, points to the action requested by the\r
407 callback function.\r
408\r
409 @retval EFI_SUCCESS The callback successfully handled the action.\r
410 @retval EFI_OUT_OF_RESOURCES Not enough storage is available to hold the\r
411 variable and its data.\r
412 @retval EFI_DEVICE_ERROR The variable could not be saved.\r
413 @retval EFI_UNSUPPORTED The specified Action is not supported by the\r
414 callback.\r
415\r
416**/\r
417EFI_STATUS\r
418EFIAPI\r
419SecureBootCallback (\r
420 IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This,\r
421 IN EFI_BROWSER_ACTION Action,\r
422 IN EFI_QUESTION_ID QuestionId,\r
423 IN UINT8 Type,\r
424 IN EFI_IFR_TYPE_VALUE *Value,\r
425 OUT EFI_BROWSER_ACTION_REQUEST *ActionRequest\r
426 );\r
427\r
ecc722ad 428\r
429/**\r
430 This function converts an input device structure to a Unicode string.\r
431\r
432 @param[in] DevPath A pointer to the device path structure.\r
433\r
434 @return A new allocated Unicode string that represents the device path.\r
435\r
436**/\r
437CHAR16 *\r
438EFIAPI\r
439DevicePathToStr (\r
440 IN EFI_DEVICE_PATH_PROTOCOL *DevPath\r
441 );\r
442\r
443\r
444/**\r
20333c6d 445 Clean up the dynamic opcode at label and form specified by both LabelId.\r
ecc722ad 446\r
447 @param[in] LabelId It is both the Form ID and Label ID for opcode deletion.\r
448 @param[in] PrivateData Module private data.\r
449\r
450**/\r
451VOID\r
452CleanUpPage (\r
453 IN UINT16 LabelId,\r
454 IN SECUREBOOT_CONFIG_PRIVATE_DATA *PrivateData\r
455 );\r
456\r
457\r
ecc722ad 458/**\r
20333c6d 459 Read file content into BufferPtr, the size of the allocate buffer\r
ecc722ad 460 is *FileSize plus AddtionAllocateSize.\r
461\r
462 @param[in] FileHandle The file to be read.\r
463 @param[in, out] BufferPtr Pointers to the pointer of allocated buffer.\r
464 @param[out] FileSize Size of input file\r
20333c6d 465 @param[in] AddtionAllocateSize Addtion size the buffer need to be allocated.\r
ecc722ad 466 In case the buffer need to contain others besides the file content.\r
20333c6d 467\r
ecc722ad 468 @retval EFI_SUCCESS The file was read into the buffer.\r
469 @retval EFI_INVALID_PARAMETER A parameter was invalid.\r
470 @retval EFI_OUT_OF_RESOURCES A memory allocation failed.\r
471 @retval others Unexpected error.\r
472\r
473**/\r
474EFI_STATUS\r
475ReadFileContent (\r
476 IN EFI_FILE_HANDLE FileHandle,\r
477 IN OUT VOID **BufferPtr,\r
478 OUT UINTN *FileSize,\r
479 IN UINTN AddtionAllocateSize\r
480 );\r
481\r
482\r
483/**\r
484 Close an open file handle.\r
485\r
486 @param[in] FileHandle The file handle to close.\r
20333c6d 487\r
ecc722ad 488**/\r
489VOID\r
490CloseFile (\r
491 IN EFI_FILE_HANDLE FileHandle\r
492 );\r
493\r
494\r
495/**\r
496 Converts a nonnegative integer to an octet string of a specified length.\r
497\r
498 @param[in] Integer Pointer to the nonnegative integer to be converted\r
499 @param[in] IntSizeInWords Length of integer buffer in words\r
20333c6d 500 @param[out] OctetString Converted octet string of the specified length\r
ecc722ad 501 @param[in] OSSizeInBytes Intended length of resulting octet string in bytes\r
502\r
503Returns:\r
504\r
505 @retval EFI_SUCCESS Data conversion successfully\r
506 @retval EFI_BUFFER_TOOL_SMALL Buffer is too small for output string\r
507\r
508**/\r
509EFI_STATUS\r
510EFIAPI\r
511Int2OctStr (\r
512 IN CONST UINTN *Integer,\r
513 IN UINTN IntSizeInWords,\r
514 OUT UINT8 *OctetString,\r
515 IN UINTN OSSizeInBytes\r
516 );\r
517\r
518\r
519/**\r
520 Convert a String to Guid Value.\r
521\r
522 @param[in] Str Specifies the String to be converted.\r
523 @param[in] StrLen Number of Unicode Characters of String (exclusive \0)\r
524 @param[out] Guid Return the result Guid value.\r
525\r
526 @retval EFI_SUCCESS The operation is finished successfully.\r
527 @retval EFI_NOT_FOUND Invalid string.\r
528\r
529**/\r
530EFI_STATUS\r
531StringToGuid (\r
20333c6d
QL
532 IN CHAR16 *Str,\r
533 IN UINTN StrLen,\r
ecc722ad 534 OUT EFI_GUID *Guid\r
535 );\r
536\r
537\r
538/**\r
539 Worker function that prints an EFI_GUID into specified Buffer.\r
540\r
541 @param[in] Guid Pointer to GUID to print.\r
542 @param[in] Buffer Buffer to print Guid into.\r
543 @param[in] BufferSize Size of Buffer.\r
20333c6d 544\r
ecc722ad 545 @retval Number of characters printed.\r
546\r
547**/\r
548UINTN\r
549GuidToString (\r
550 IN EFI_GUID *Guid,\r
551 IN CHAR16 *Buffer,\r
552 IN UINTN BufferSize\r
553 );\r
554\r
762d8ddb
DB
555/**\r
556 Update the PK form base on the input file path info.\r
557\r
558 @param FilePath Point to the file path.\r
559\r
560 @retval TRUE Exit caller function.\r
561 @retval FALSE Not exit caller function.\r
562**/\r
563BOOLEAN\r
564UpdatePKFromFile (\r
565 IN EFI_DEVICE_PATH_PROTOCOL *FilePath\r
566 );\r
567\r
568/**\r
569 Update the KEK form base on the input file path info.\r
570\r
571 @param FilePath Point to the file path.\r
572\r
573 @retval TRUE Exit caller function.\r
574 @retval FALSE Not exit caller function.\r
575**/\r
576BOOLEAN\r
577UpdateKEKFromFile (\r
578 IN EFI_DEVICE_PATH_PROTOCOL *FilePath\r
579 );\r
580\r
581/**\r
582 Update the DB form base on the input file path info.\r
583\r
584 @param FilePath Point to the file path.\r
585\r
586 @retval TRUE Exit caller function.\r
587 @retval FALSE Not exit caller function.\r
588**/\r
589BOOLEAN\r
590UpdateDBFromFile (\r
591 IN EFI_DEVICE_PATH_PROTOCOL *FilePath\r
592 );\r
593\r
594/**\r
595 Update the DBX form base on the input file path info.\r
596\r
597 @param FilePath Point to the file path.\r
598\r
599 @retval TRUE Exit caller function.\r
600 @retval FALSE Not exit caller function.\r
601**/\r
602BOOLEAN\r
603UpdateDBXFromFile (\r
604 IN EFI_DEVICE_PATH_PROTOCOL *FilePath\r
605 );\r
606\r
607/**\r
608 Update the DBT form base on the input file path info.\r
609\r
610 @param FilePath Point to the file path.\r
611\r
612 @retval TRUE Exit caller function.\r
613 @retval FALSE Not exit caller function.\r
614**/\r
615BOOLEAN\r
616UpdateDBTFromFile (\r
617 IN EFI_DEVICE_PATH_PROTOCOL *FilePath\r
618 );\r
619\r
2e728930 620#endif\r