diff options
Diffstat (limited to 'Core/EM/SecurityPkg/SecureBootMod.h')
-rw-r--r-- | Core/EM/SecurityPkg/SecureBootMod.h | 116 |
1 files changed, 116 insertions, 0 deletions
diff --git a/Core/EM/SecurityPkg/SecureBootMod.h b/Core/EM/SecurityPkg/SecureBootMod.h new file mode 100644 index 0000000..0ec0642 --- /dev/null +++ b/Core/EM/SecurityPkg/SecureBootMod.h @@ -0,0 +1,116 @@ +//********************************************************************** +//********************************************************************** +//** ** +//** (C)Copyright 1985-2012, American Megatrends, Inc. ** +//** ** +//** All Rights Reserved. ** +//** ** +//** 5555 Oakbrook Pkwy, Suite 200, Norcross, GA 30093 ** +//** ** +//** Phone: (770)-246-8600 ** +//** ** +//********************************************************************** +//********************************************************************** +//********************************************************************** +// $Header: /Alaska/SOURCE/Modules/SecureBoot_WIN8/SecureBootMod.h 6 8/15/13 10:10a Alexp $ +// +// $Revision: 6 $ +// +// $Date: 8/15/13 10:10a $ +//********************************************************************** +// Revision History +// ---------------- +// $Log: /Alaska/SOURCE/Modules/SecureBoot_WIN8/SecureBootMod.h $ +// +// 6 8/15/13 10:10a Alexp +// supported Signatures include 3 more: EFI_CERT_X509_SHAXXX_GUID +// +// 5 7/26/13 3:30p Alexp +// add dbt related defines +// +// 4 5/17/13 6:02p Alexp +// add placeholder defines for "dbt" +// +// 3 12/06/12 7:32p Alexp +// define AMI_SECURE_VAR_PRESENT_VAR +// +// 2 11/26/12 10:43a Alexp +// +// +//********************************************************************** + +//<AMI_FHDR_START> +//---------------------------------------------------------------------------- +// +// Name: SecureBootMod.h +// +// Description: Common Secure Boot definitions +// +//---------------------------------------------------------------------------- +//<AMI_FHDR_END> +#ifndef _SECURE_BOOT_MODE_H_ +#define _SECURE_BOOT_MODE_H_ + +#define AMI_SECURE_BOOT_SETUP_VAR L"SecureBootSetup" +#define AMI_SECURE_VAR_PRESENT_VAR L"SecureVarPresent" + +#pragma pack(1) +typedef struct{ + UINT8 SecureBootSupport; + UINT8 SecureBootMode; + UINT8 DefaultKeyProvision; + UINT8 Load_from_FV; + UINT8 Load_from_OROM; + UINT8 Load_from_REMOVABLE_MEDIA; + UINT8 Load_from_FIXED_MEDIA; +} SECURE_BOOT_SETUP_VAR; + +typedef struct{ + UINT8 Value; +} SETUP_MODE_VAR; + +typedef struct{ + UINT8 Value; +} SECURE_BOOT_VAR; + +typedef struct{ + UINT8 DBX; + UINT8 DBT; + UINT8 DB; + UINT8 KEK; + UINT8 PK; +} SECURE_VAR_INSTALL_VAR; + +#pragma pack() + +// EFI_IMAGE_SECURITY_DATABASE_DEFAULT must be defined in ImageAuthentication.h (Core 4.6.5.4 +) +// UEFI ECR874: Install Factory defaults as Read-only volatile variables for key distribution. +#ifndef EFI_IMAGE_SECURITY_DATABASE_DEFAULT +#define EFI_IMAGE_SECURITY_DATABASE_DEFAULT L"dbDefault" +#define EFI_IMAGE_SECURITY_DATABASE1_DEFAULT L"dbxDefault" +#define EFI_PLATFORM_KEY_NAME_DEFAULT L"PKDefault" +#define EFI_KEY_EXCHANGE_KEY_NAME_DEFAULT L"KEKDefault" +#define EFI_IMAGE_SECURITY_DATABASE2_DEFAULT L"dbtDefault" +#endif +#ifndef EFI_IMAGE_SECURITY_DATABASE2 +#define EFI_IMAGE_SECURITY_DATABASE2 L"dbt" +#define EFI_IMAGE_SECURITY_DATABASE2_DEFAULT L"dbtDefault" +#endif + +#define SIGSUPPORT_NUM 8 +#define SIGSUPPORT_LIST EFI_CERT_X509_SHA256_GUID, EFI_CERT_X509_SHA384_GUID, EFI_CERT_X509_SHA512_GUID, EFI_CERT_SHA256_GUID, EFI_CERT_X509, EFI_CERT_RSA2048_GUID, EFI_CERT_RSA2048_SHA256_GUID, EFI_CERT_RSA2048_SHA1_GUID + +#endif //_SECURE_BOOT_MODE_H_ +//********************************************************************** +//********************************************************************** +//** ** +//** (C)Copyright 1985-2012, American Megatrends, Inc. ** +//** ** +//** All Rights Reserved. ** +//** ** +//** 5555 Oakbrook Pkwy, Suite 200, Norcross, GA 30093 ** +//** ** +//** Phone: (770)-246-8600 ** +//** ** +//********************************************************************** +//********************************************************************** |