//\r
// Get KEK database variable.\r
//\r
- GetEfiGlobalVariable2 (EFI_KEY_EXCHANGE_KEY_NAME, &KekList, NULL);\r
+ GetEfiGlobalVariable2 (EFI_KEY_EXCHANGE_KEY_NAME, (VOID**)&KekList, NULL);\r
if (KekList == NULL) {\r
return EFI_SECURITY_VIOLATION;\r
}\r
return EFI_ACCESS_DENIED;\r
}\r
\r
- GetVariable2 (EFI_SECURE_BOOT_ENABLE_NAME, &gEfiSecureBootEnableDisableGuid, &SecureBootEnable, NULL);\r
+ GetVariable2 (EFI_SECURE_BOOT_ENABLE_NAME, &gEfiSecureBootEnableDisableGuid, (VOID**)&SecureBootEnable, NULL);\r
//\r
// Skip verification if SecureBootEnable variable doesn't exist.\r
//\r
\r
FreePool (SecureBootEnable);\r
\r
- GetEfiGlobalVariable2 (EFI_SETUP_MODE_NAME, &SetupMode, NULL);\r
+ GetEfiGlobalVariable2 (EFI_SETUP_MODE_NAME, (VOID**)&SetupMode, NULL);\r
\r
//\r
// SetupMode doesn't exist means no AuthVar driver is dispatched,\r
// If this library is built-in, it means firmware has capability to perform\r
// driver signing verification.\r
//\r
- GetEfiGlobalVariable2 (EFI_SECURE_BOOT_MODE_NAME, &SecureBootModePtr, NULL);\r
+ GetEfiGlobalVariable2 (EFI_SECURE_BOOT_MODE_NAME, (VOID**)&SecureBootModePtr, NULL);\r
if (SecureBootModePtr == NULL) {\r
SecureBootMode = SECURE_BOOT_MODE_DISABLE;\r
//\r