/// SSL2.0 is obsolete and should not be used.\r
///\r
typedef struct {\r
- UINT8 Major;\r
- UINT8 Minor;\r
+ UINT8 Major;\r
+ UINT8 Minor;\r
} EFI_TLS_VERSION;\r
\r
///\r
///\r
#pragma pack (1)\r
typedef struct {\r
- UINT8 Data1;\r
- UINT8 Data2;\r
+ UINT8 Data1;\r
+ UINT8 Data2;\r
} EFI_TLS_CIPHER;\r
#pragma pack ()\r
\r
///\r
#pragma pack (1)\r
typedef struct {\r
- UINT16 ExtensionType;\r
- UINT16 Length;\r
- UINT8 Data[1];\r
+ UINT16 ExtensionType;\r
+ UINT16 Length;\r
+ UINT8 Data[1];\r
} EFI_TLS_EXTENSION;\r
#pragma pack ()\r
\r
/// Use either EFI_TLS_VERIFY_NONE or EFI_TLS_VERIFY_PEER, the last two options\r
/// are 'ORed' with EFI_TLS_VERIFY_PEER if they are desired.\r
///\r
-typedef UINT32 EFI_TLS_VERIFY;\r
+typedef UINT32 EFI_TLS_VERIFY;\r
///\r
/// No certificates will be sent or the TLS/SSL handshake will be continued regardless\r
/// of the certificate verification result.\r
///\r
-#define EFI_TLS_VERIFY_NONE 0x0\r
+#define EFI_TLS_VERIFY_NONE 0x0\r
///\r
/// The TLS/SSL handshake is immediately terminated with an alert message containing\r
/// the reason for the certificate verification failure.\r
///\r
-#define EFI_TLS_VERIFY_PEER 0x1\r
+#define EFI_TLS_VERIFY_PEER 0x1\r
///\r
/// EFI_TLS_VERIFY_FAIL_IF_NO_PEER_CERT is only meaningful in the server mode.\r
/// TLS session will fail if client certificate is absent.\r
/// TLS session only verify client once, and doesn't request certificate during\r
/// re-negotiation.\r
///\r
-#define EFI_TLS_VERIFY_CLIENT_ONCE 0x4\r
+#define EFI_TLS_VERIFY_CLIENT_ONCE 0x4\r
\r
///\r
/// EFI_TLS_VERIFY_HOST_FLAG\r
/// There is no additional flags set for hostname validation.\r
/// Wildcards are supported and they match only in the left-most label.\r
///\r
-#define EFI_TLS_VERIFY_FLAG_NONE 0x00\r
+#define EFI_TLS_VERIFY_FLAG_NONE 0x00\r
///\r
/// Always check the Subject Distinguished Name (DN) in the peer certificate even if the\r
/// certificate contains Subject Alternative Name (SAN).\r
///\r
-#define EFI_TLS_VERIFY_FLAG_ALWAYS_CHECK_SUBJECT 0x01\r
+#define EFI_TLS_VERIFY_FLAG_ALWAYS_CHECK_SUBJECT 0x01\r
///\r
/// Disable the match of all wildcards.\r
///\r
-#define EFI_TLS_VERIFY_FLAG_NO_WILDCARDS 0x02\r
+#define EFI_TLS_VERIFY_FLAG_NO_WILDCARDS 0x02\r
///\r
/// Disable the "*" as wildcard in labels that have a prefix or suffix (e.g. "www*" or "*www").\r
///\r
-#define EFI_TLS_VERIFY_FLAG_NO_PARTIAL_WILDCARDS 0x04\r
+#define EFI_TLS_VERIFY_FLAG_NO_PARTIAL_WILDCARDS 0x04\r
///\r
/// Allow the "*" to match more than one labels. Otherwise, only matches a single label.\r
///\r
-#define EFI_TLS_VERIFY_FLAG_MULTI_LABEL_WILDCARDS 0x08\r
+#define EFI_TLS_VERIFY_FLAG_MULTI_LABEL_WILDCARDS 0x08\r
///\r
/// Restrict to only match direct child sub-domains which start with ".".\r
/// For example, a name of ".example.com" would match "www.example.com" with this flag,\r
/// but would not match "www.sub.example.com".\r
///\r
-#define EFI_TLS_VERIFY_FLAG_SINGLE_LABEL_SUBDOMAINS 0x10\r
+#define EFI_TLS_VERIFY_FLAG_SINGLE_LABEL_SUBDOMAINS 0x10\r
///\r
/// Never check the Subject Distinguished Name (DN) even there is no\r
/// Subject Alternative Name (SAN) in the certificate.\r
///\r
-#define EFI_TLS_VERIFY_FLAG_NEVER_CHECK_SUBJECT 0x20\r
+#define EFI_TLS_VERIFY_FLAG_NEVER_CHECK_SUBJECT 0x20\r
\r
///\r
/// EFI_TLS_VERIFY_HOST\r
///\r
#pragma pack (1)\r
typedef struct {\r
- EFI_TLS_VERIFY_HOST_FLAG Flags;\r
- CHAR8 *HostName;\r
+ EFI_TLS_VERIFY_HOST_FLAG Flags;\r
+ CHAR8 *HostName;\r
} EFI_TLS_VERIFY_HOST;\r
#pragma pack ()\r
\r
///\r
#pragma pack (1)\r
typedef struct {\r
- UINT32 GmtUnixTime;\r
- UINT8 RandomBytes[28];\r
+ UINT32 GmtUnixTime;\r
+ UINT8 RandomBytes[28];\r
} EFI_TLS_RANDOM;\r
#pragma pack ()\r
\r
///\r
#pragma pack (1)\r
typedef struct {\r
- UINT8 Data[48];\r
+ UINT8 Data[48];\r
} EFI_TLS_MASTER_SECRET;\r
#pragma pack ()\r
\r
#define MAX_TLS_SESSION_ID_LENGTH 32\r
#pragma pack (1)\r
typedef struct {\r
- UINT16 Length;\r
- UINT8 Data[MAX_TLS_SESSION_ID_LENGTH];\r
+ UINT16 Length;\r
+ UINT8 Data[MAX_TLS_SESSION_ID_LENGTH];\r
} EFI_TLS_SESSION_ID;\r
#pragma pack ()\r
\r
EfiTlsSessionError,\r
\r
EfiTlsSessionStateMaximum\r
-\r
} EFI_TLS_SESSION_STATE;\r
\r
///\r
///\r
/// Length of data buffer in the fragment.\r
///\r
- UINT32 FragmentLength;\r
+ UINT32 FragmentLength;\r
///\r
/// Pointer to the data buffer in the fragment.\r
///\r
- VOID *FragmentBuffer;\r
+ VOID *FragmentBuffer;\r
} EFI_TLS_FRAGMENT_DATA;\r
\r
///\r
**/\r
typedef\r
EFI_STATUS\r
-(EFIAPI *EFI_TLS_SET_SESSION_DATA) (\r
+(EFIAPI *EFI_TLS_SET_SESSION_DATA)(\r
IN EFI_TLS_PROTOCOL *This,\r
IN EFI_TLS_SESSION_DATA_TYPE DataType,\r
IN VOID *Data,\r
**/\r
typedef\r
EFI_STATUS\r
-(EFIAPI *EFI_TLS_GET_SESSION_DATA) (\r
+(EFIAPI *EFI_TLS_GET_SESSION_DATA)(\r
IN EFI_TLS_PROTOCOL *This,\r
IN EFI_TLS_SESSION_DATA_TYPE DataType,\r
IN OUT VOID *Data OPTIONAL,\r
**/\r
typedef\r
EFI_STATUS\r
-(EFIAPI *EFI_TLS_BUILD_RESPONSE_PACKET) (\r
+(EFIAPI *EFI_TLS_BUILD_RESPONSE_PACKET)(\r
IN EFI_TLS_PROTOCOL *This,\r
IN UINT8 *RequestBuffer OPTIONAL,\r
IN UINTN RequestSize OPTIONAL,\r
**/\r
typedef\r
EFI_STATUS\r
-(EFIAPI *EFI_TLS_PROCESS_PACKET) (\r
+(EFIAPI *EFI_TLS_PROCESS_PACKET)(\r
IN EFI_TLS_PROTOCOL *This,\r
IN OUT EFI_TLS_FRAGMENT_DATA **FragmentTable,\r
IN UINT32 *FragmentCount,\r
/// For detail of TLS, please refer to TLS related RFC.\r
///\r
struct _EFI_TLS_PROTOCOL {\r
- EFI_TLS_SET_SESSION_DATA SetSessionData;\r
- EFI_TLS_GET_SESSION_DATA GetSessionData;\r
- EFI_TLS_BUILD_RESPONSE_PACKET BuildResponsePacket;\r
- EFI_TLS_PROCESS_PACKET ProcessPacket;\r
+ EFI_TLS_SET_SESSION_DATA SetSessionData;\r
+ EFI_TLS_GET_SESSION_DATA GetSessionData;\r
+ EFI_TLS_BUILD_RESPONSE_PACKET BuildResponsePacket;\r
+ EFI_TLS_PROCESS_PACKET ProcessPacket;\r
};\r
\r
-extern EFI_GUID gEfiTlsServiceBindingProtocolGuid;\r
-extern EFI_GUID gEfiTlsProtocolGuid;\r
+extern EFI_GUID gEfiTlsServiceBindingProtocolGuid;\r
+extern EFI_GUID gEfiTlsProtocolGuid;\r
\r
-#endif // __EFI_TLS_PROTOCOL_H__\r
+#endif // __EFI_TLS_PROTOCOL_H__\r