//\r
// Tool generated IFR binary data and String package data\r
//\r
-extern UINT8 SecureBootConfigBin[];\r
-extern UINT8 SecureBootConfigDxeStrings[];\r
+extern UINT8 SecureBootConfigBin[];\r
+extern UINT8 SecureBootConfigDxeStrings[];\r
\r
//\r
// Shared IFR form update data\r
//\r
-extern VOID *mStartOpCodeHandle;\r
-extern VOID *mEndOpCodeHandle;\r
-extern EFI_IFR_GUID_LABEL *mStartLabel;\r
-extern EFI_IFR_GUID_LABEL *mEndLabel;\r
+extern VOID *mStartOpCodeHandle;\r
+extern VOID *mEndOpCodeHandle;\r
+extern EFI_IFR_GUID_LABEL *mStartLabel;\r
+extern EFI_IFR_GUID_LABEL *mEndLabel;\r
\r
-#define MAX_CHAR 480\r
-#define TWO_BYTE_ENCODE 0x82\r
-#define BUFFER_MAX_SIZE 100\r
+#define MAX_CHAR 480\r
+#define TWO_BYTE_ENCODE 0x82\r
+#define BUFFER_MAX_SIZE 100\r
\r
//\r
// SHA-256 digest size in bytes\r
//\r
// Set max digest size as SHA512 Output (64 bytes) by far\r
//\r
-#define MAX_DIGEST_SIZE SHA512_DIGEST_SIZE\r
+#define MAX_DIGEST_SIZE SHA512_DIGEST_SIZE\r
\r
-#define WIN_CERT_UEFI_RSA2048_SIZE 256\r
+#define WIN_CERT_UEFI_RSA2048_SIZE 256\r
\r
//\r
// Support hash types\r
//\r
-#define HASHALG_SHA224 0x00000000\r
-#define HASHALG_SHA256 0x00000001\r
-#define HASHALG_SHA384 0x00000002\r
-#define HASHALG_SHA512 0x00000003\r
-#define HASHALG_RAW 0x00000004\r
-#define HASHALG_MAX 0x00000004\r
+#define HASHALG_SHA224 0x00000000\r
+#define HASHALG_SHA256 0x00000001\r
+#define HASHALG_SHA384 0x00000002\r
+#define HASHALG_SHA512 0x00000003\r
+#define HASHALG_RAW 0x00000004\r
+#define HASHALG_MAX 0x00000004\r
\r
//\r
// Certificate public key minimum size (bytes)\r
//\r
-#define CER_PUBKEY_MIN_SIZE 256\r
+#define CER_PUBKEY_MIN_SIZE 256\r
\r
//\r
// Types of errors may occur during certificate enrollment.\r
//\r
Unqualified_Key,\r
Enroll_Error_Max\r
-}ENROLL_KEY_ERROR;\r
+} ENROLL_KEY_ERROR;\r
\r
typedef struct {\r
- UINTN Signature;\r
- LIST_ENTRY Head;\r
- UINTN MenuNumber;\r
+ UINTN Signature;\r
+ LIST_ENTRY Head;\r
+ UINTN MenuNumber;\r
} SECUREBOOT_MENU_OPTION;\r
\r
typedef struct {\r
- EFI_FILE_HANDLE FHandle;\r
- UINT16 *FileName;\r
- UINT8 FileType;\r
+ EFI_FILE_HANDLE FHandle;\r
+ UINT16 *FileName;\r
+ UINT8 FileType;\r
} SECUREBOOT_FILE_CONTEXT;\r
\r
#define SECUREBOOT_FREE_NON_NULL(Pointer) \\r
// We define another format of 5th directory entry: security directory\r
//\r
typedef struct {\r
- UINT32 Offset; // Offset of certificate\r
- UINT32 SizeOfCert; // size of certificate appended\r
+ UINT32 Offset; // Offset of certificate\r
+ UINT32 SizeOfCert; // size of certificate appended\r
} EFI_IMAGE_SECURITY_DATA_DIRECTORY;\r
\r
-typedef enum{\r
+typedef enum {\r
ImageType_IA32,\r
ImageType_X64\r
} IMAGE_TYPE;\r
/// HII specific Vendor Device Path definition.\r
///\r
typedef struct {\r
- VENDOR_DEVICE_PATH VendorDevicePath;\r
- EFI_DEVICE_PATH_PROTOCOL End;\r
+ VENDOR_DEVICE_PATH VendorDevicePath;\r
+ EFI_DEVICE_PATH_PROTOCOL End;\r
} HII_VENDOR_DEVICE_PATH;\r
\r
typedef enum {\r
Delete_Signature_List_All,\r
Delete_Signature_List_One,\r
Delete_Signature_Data\r
-}SIGNATURE_DELETE_TYPE;\r
+} SIGNATURE_DELETE_TYPE;\r
\r
typedef struct {\r
UINTN Signature;\r
BOOLEAN *CheckArray; // Record which signature data checked.\r
} SECUREBOOT_CONFIG_PRIVATE_DATA;\r
\r
-extern SECUREBOOT_CONFIG_PRIVATE_DATA mSecureBootConfigPrivateDateTemplate;\r
-extern SECUREBOOT_CONFIG_PRIVATE_DATA *gSecureBootPrivateData;\r
+extern SECUREBOOT_CONFIG_PRIVATE_DATA mSecureBootConfigPrivateDateTemplate;\r
+extern SECUREBOOT_CONFIG_PRIVATE_DATA *gSecureBootPrivateData;\r
\r
-#define SECUREBOOT_CONFIG_PRIVATE_DATA_SIGNATURE SIGNATURE_32 ('S', 'E', 'C', 'B')\r
+#define SECUREBOOT_CONFIG_PRIVATE_DATA_SIGNATURE SIGNATURE_32 ('S', 'E', 'C', 'B')\r
#define SECUREBOOT_CONFIG_PRIVATE_FROM_THIS(a) CR (a, SECUREBOOT_CONFIG_PRIVATE_DATA, ConfigAccess, SECUREBOOT_CONFIG_PRIVATE_DATA_SIGNATURE)\r
\r
//\r
//\r
#pragma pack(1)\r
typedef struct _CPL_KEY_INFO {\r
- UINT32 KeyLengthInBits; // Key Length In Bits\r
- UINT32 BlockSize; // Operation Block Size in Bytes\r
- UINT32 CipherBlockSize; // Output Cipher Block Size in Bytes\r
- UINT32 KeyType; // Key Type\r
- UINT32 CipherMode; // Cipher Mode for Symmetric Algorithm\r
- UINT32 Flags; // Additional Key Property Flags\r
+ UINT32 KeyLengthInBits; // Key Length In Bits\r
+ UINT32 BlockSize; // Operation Block Size in Bytes\r
+ UINT32 CipherBlockSize; // Output Cipher Block Size in Bytes\r
+ UINT32 KeyType; // Key Type\r
+ UINT32 CipherMode; // Cipher Mode for Symmetric Algorithm\r
+ UINT32 Flags; // Additional Key Property Flags\r
} CPL_KEY_INFO;\r
#pragma pack()\r
\r
-\r
/**\r
Retrieves the size, in bytes, of the context buffer required for hash operations.\r
\r
IN OUT VOID *HashContext\r
);\r
\r
-\r
/**\r
Performs digest on a data buffer of the specified length. This function can\r
be called multiple times to compute the digest of long or discontinuous data streams.\r
} HASH_TABLE;\r
\r
typedef struct {\r
- WIN_CERTIFICATE Hdr;\r
- UINT8 CertData[1];\r
+ WIN_CERTIFICATE Hdr;\r
+ UINT8 CertData[1];\r
} WIN_CERTIFICATE_EFI_PKCS;\r
\r
-\r
/**\r
This function publish the SecureBoot configuration Form.\r
\r
IN OUT SECUREBOOT_CONFIG_PRIVATE_DATA *PrivateData\r
);\r
\r
-\r
/**\r
This function removes SecureBoot configuration Form.\r
\r
**/\r
VOID\r
UninstallSecureBootConfigForm (\r
- IN OUT SECUREBOOT_CONFIG_PRIVATE_DATA *PrivateData\r
+ IN OUT SECUREBOOT_CONFIG_PRIVATE_DATA *PrivateData\r
);\r
\r
-\r
/**\r
This function allows a caller to extract the current configuration for one\r
or more named elements from the target driver.\r
EFI_STATUS\r
EFIAPI\r
SecureBootExtractConfig (\r
- IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This,\r
- IN CONST EFI_STRING Request,\r
- OUT EFI_STRING *Progress,\r
- OUT EFI_STRING *Results\r
+ IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This,\r
+ IN CONST EFI_STRING Request,\r
+ OUT EFI_STRING *Progress,\r
+ OUT EFI_STRING *Results\r
);\r
\r
-\r
/**\r
This function processes the results of changes in configuration.\r
\r
EFI_STATUS\r
EFIAPI\r
SecureBootRouteConfig (\r
- IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This,\r
- IN CONST EFI_STRING Configuration,\r
- OUT EFI_STRING *Progress\r
+ IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This,\r
+ IN CONST EFI_STRING Configuration,\r
+ OUT EFI_STRING *Progress\r
);\r
\r
-\r
/**\r
This function processes the results of changes in configuration.\r
\r
EFI_STATUS\r
EFIAPI\r
SecureBootCallback (\r
- IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This,\r
- IN EFI_BROWSER_ACTION Action,\r
- IN EFI_QUESTION_ID QuestionId,\r
- IN UINT8 Type,\r
- IN EFI_IFR_TYPE_VALUE *Value,\r
- OUT EFI_BROWSER_ACTION_REQUEST *ActionRequest\r
+ IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This,\r
+ IN EFI_BROWSER_ACTION Action,\r
+ IN EFI_QUESTION_ID QuestionId,\r
+ IN UINT8 Type,\r
+ IN EFI_IFR_TYPE_VALUE *Value,\r
+ OUT EFI_BROWSER_ACTION_REQUEST *ActionRequest\r
);\r
\r
-\r
/**\r
This function converts an input device structure to a Unicode string.\r
\r
CHAR16 *\r
EFIAPI\r
DevicePathToStr (\r
- IN EFI_DEVICE_PATH_PROTOCOL *DevPath\r
+ IN EFI_DEVICE_PATH_PROTOCOL *DevPath\r
);\r
\r
-\r
/**\r
Clean up the dynamic opcode at label and form specified by both LabelId.\r
\r
**/\r
VOID\r
CleanUpPage (\r
- IN UINT16 LabelId,\r
- IN SECUREBOOT_CONFIG_PRIVATE_DATA *PrivateData\r
+ IN UINT16 LabelId,\r
+ IN SECUREBOOT_CONFIG_PRIVATE_DATA *PrivateData\r
);\r
\r
-\r
/**\r
Read file content into BufferPtr, the size of the allocate buffer\r
is *FileSize plus AdditionAllocateSize.\r
**/\r
EFI_STATUS\r
ReadFileContent (\r
- IN EFI_FILE_HANDLE FileHandle,\r
- IN OUT VOID **BufferPtr,\r
- OUT UINTN *FileSize,\r
- IN UINTN AdditionAllocateSize\r
+ IN EFI_FILE_HANDLE FileHandle,\r
+ IN OUT VOID **BufferPtr,\r
+ OUT UINTN *FileSize,\r
+ IN UINTN AdditionAllocateSize\r
);\r
\r
-\r
/**\r
Close an open file handle.\r
\r
**/\r
VOID\r
CloseFile (\r
- IN EFI_FILE_HANDLE FileHandle\r
+ IN EFI_FILE_HANDLE FileHandle\r
);\r
\r
-\r
/**\r
Converts a nonnegative integer to an octet string of a specified length.\r
\r
EFI_STATUS\r
EFIAPI\r
Int2OctStr (\r
- IN CONST UINTN *Integer,\r
- IN UINTN IntSizeInWords,\r
- OUT UINT8 *OctetString,\r
- IN UINTN OSSizeInBytes\r
+ IN CONST UINTN *Integer,\r
+ IN UINTN IntSizeInWords,\r
+ OUT UINT8 *OctetString,\r
+ IN UINTN OSSizeInBytes\r
);\r
\r
/**\r
BOOLEAN\r
EFIAPI\r
UpdatePKFromFile (\r
- IN EFI_DEVICE_PATH_PROTOCOL *FilePath\r
+ IN EFI_DEVICE_PATH_PROTOCOL *FilePath\r
);\r
\r
/**\r
BOOLEAN\r
EFIAPI\r
UpdateKEKFromFile (\r
- IN EFI_DEVICE_PATH_PROTOCOL *FilePath\r
+ IN EFI_DEVICE_PATH_PROTOCOL *FilePath\r
);\r
\r
/**\r
BOOLEAN\r
EFIAPI\r
UpdateDBFromFile (\r
- IN EFI_DEVICE_PATH_PROTOCOL *FilePath\r
+ IN EFI_DEVICE_PATH_PROTOCOL *FilePath\r
);\r
\r
/**\r
BOOLEAN\r
EFIAPI\r
UpdateDBXFromFile (\r
- IN EFI_DEVICE_PATH_PROTOCOL *FilePath\r
+ IN EFI_DEVICE_PATH_PROTOCOL *FilePath\r
);\r
\r
/**\r
BOOLEAN\r
EFIAPI\r
UpdateDBTFromFile (\r
- IN EFI_DEVICE_PATH_PROTOCOL *FilePath\r
+ IN EFI_DEVICE_PATH_PROTOCOL *FilePath\r
);\r
\r
#endif\r