SecurityPkg[all]  0.98
 All Data Structures Files Functions Variables Typedefs Enumerations Enumerator Macros Pages
AuthenticatedVariableFormat.h File Reference

Macros

#define EFI_SECURE_BOOT_ENABLE_DISABLE   { 0xf0a30bc7, 0xaf08, 0x4556, { 0x99, 0xc4, 0x0, 0x10, 0x9, 0xc9, 0x3a, 0x44 } }
 
#define EFI_SECURE_BOOT_ENABLE_NAME   L"SecureBootEnable"
 
#define SECURE_BOOT_ENABLE   1
 
#define SECURE_BOOT_DISABLE   0
 
#define EFI_CUSTOM_MODE_NAME   L"CustomMode"
 
#define CUSTOM_SECURE_BOOT_MODE   1
 
#define STANDARD_SECURE_BOOT_MODE   0
 
#define EFI_VENDOR_KEYS_NV_VARIABLE_NAME   L"VendorKeysNv"
 
#define VENDOR_KEYS_VALID   1
 
#define VENDOR_KEYS_MODIFIED   0
 

Variables

EFI_GUID gEfiSecureBootEnableDisableGuid
 
EFI_GUID gEfiCertDbGuid
 
EFI_GUID gEfiCustomModeEnableGuid
 
EFI_GUID gEfiVendorKeysNvGuid
 

Detailed Description

The variable data structures are related to EDKII-specific implementation of UEFI authenticated variables. AuthenticatedVariableFormat.h defines variable data headers and variable storage region headers that has been moved to VariableFormat.h.

Copyright (c) 2009 - 2016, Intel Corporation. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent

Macro Definition Documentation

#define CUSTOM_SECURE_BOOT_MODE   1
#define EFI_CUSTOM_MODE_NAME   L"CustomMode"

"CustomMode" variable for two Secure Boot modes feature: "Custom" and "Standard". Standard Secure Boot mode is the default mode as UEFI Spec's description. Custom Secure Boot mode allows for more flexibility as specified in the following: Can enroll or delete PK without existing PK's private key. Can enroll or delete KEK without existing PK's private key. Can enroll or delete signature from DB/DBX without KEK's private key.

GUID: gEfiCustomModeEnableGuid

Format: UINT8

#define EFI_SECURE_BOOT_ENABLE_DISABLE   { 0xf0a30bc7, 0xaf08, 0x4556, { 0x99, 0xc4, 0x0, 0x10, 0x9, 0xc9, 0x3a, 0x44 } }
#define EFI_SECURE_BOOT_ENABLE_NAME   L"SecureBootEnable"

"SecureBootEnable" variable for the Secure Boot feature enable/disable. This variable is used for allowing a physically present user to disable Secure Boot via firmware setup without the possession of PKpriv.

GUID: gEfiSecureBootEnableDisableGuid

Format: UINT8

#define EFI_VENDOR_KEYS_NV_VARIABLE_NAME   L"VendorKeysNv"

"VendorKeysNv" variable to record the out of band secure boot keys modification. This variable is a read-only NV variable that indicates whether someone other than the platform vendor has used a mechanism not defined by the UEFI Specification to transition the system to setup mode or to update secure boot keys.

GUID: gEfiVendorKeysNvGuid

Format: UINT8

#define SECURE_BOOT_DISABLE   0
#define SECURE_BOOT_ENABLE   1
#define STANDARD_SECURE_BOOT_MODE   0
#define VENDOR_KEYS_MODIFIED   0
#define VENDOR_KEYS_VALID   1

Variable Documentation

EFI_GUID gEfiCertDbGuid
EFI_GUID gEfiCustomModeEnableGuid
EFI_GUID gEfiSecureBootEnableDisableGuid
EFI_GUID gEfiVendorKeysNvGuid