From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by spool.mail.gandi.net (Postfix) with ESMTPS id 44B3E78003C for ; Wed, 6 Mar 2024 06:54:25 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=Ud+3gd9VJ4jtiPgg0KX1BhHI+iICqBGZpX7/ViUQ5nk=; c=relaxed/simple; d=groups.io; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Transfer-Encoding; s=20240206; t=1709708063; v=1; b=dvAxVV8wT2lYQzz7XoxY30KFQNprx/CFZmmfumWiE9OGmhvXoZ0nYCJu2y9B7Ps8Z1pD0IEZ EYZpKtXkMJyGY3gf1aWGijGT3dMU7S+fqU0jM5BKbZ4S+Ynl6aJQWLb/N14l8rYpa01IaKWc3Kl 8GG3aTIz/GTQGYSNIIKDppKhocVUTElPMOosI6qJ3cfXiQ9s+w6fg5QYZO7w+p/LLe0+JMz4Feq FHS6KzFL2LHL+KidwHjmolPf2qqdZIUApegMdGaPgKzdizDfm1AP8gIdSl0KIbLiKCTMjs8v+QX tRSGjoQJHxJxCT8CW9ZYIlid8UbZ6p/F9Nv/37w1QZcfg== X-Received: by 127.0.0.2 with SMTP id V0bMYY7687511xBPKrdVqC9O; Tue, 05 Mar 2024 22:54:23 -0800 X-Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.19]) by mx.groups.io with SMTP id smtpd.web10.6645.1709708062741515496 for ; Tue, 05 Mar 2024 22:54:22 -0800 X-IronPort-AV: E=McAfee;i="6600,9927,11004"; a="4163024" X-IronPort-AV: E=Sophos;i="6.06,207,1705392000"; d="scan'208";a="4163024" X-Received: from fmviesa008.fm.intel.com ([10.60.135.148]) by fmvoesa113.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Mar 2024 22:54:22 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.06,207,1705392000"; d="scan'208";a="9736960" X-Received: from shwdejointd777.ccr.corp.intel.com ([10.239.58.116]) by fmviesa008.fm.intel.com with ESMTP; 05 Mar 2024 22:54:21 -0800 From: "Wenxing Hou" To: devel@edk2.groups.io Cc: Michael D Kinney , Liming Gao , Zhiguang Liu , Jiewen Yao Subject: [edk2-devel] [PATCH] MdePkg: Add devAuthBoot GlobalVariable Date: Tue, 05 Mar 2024 22:54:22 -0800 Message-Id: <20240306065418.10623-1-wenxing.hou@intel.com> MIME-Version: 1.0 Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,wenxing.hou@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: 28y1AkV5V6h203E7bTisP3l6x7686176AA= Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20240206 header.b=dvAxVV8w; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io According to UEFI 2.10 spec 3.3 Globally Defined Variables section, add devAuthBoot GlobalVariable. Cc: Michael D Kinney Cc: Liming Gao Cc: Zhiguang Liu Cc: Jiewen Yao Signed-off-by: Wenxing Hou --- MdePkg/Include/Guid/GlobalVariable.h | 8 +++++++- MdePkg/Include/Guid/ImageAuthentication.h | 5 ++++- 2 files changed, 11 insertions(+), 2 deletions(-) diff --git a/MdePkg/Include/Guid/GlobalVariable.h b/MdePkg/Include/Guid/Glo= balVariable.h index eb2ce6aaf2..eb6e5a043e 100644 --- a/MdePkg/Include/Guid/GlobalVariable.h +++ b/MdePkg/Include/Guid/GlobalVariable.h @@ -1,7 +1,7 @@ /** @file=0D GUID for EFI (NVRAM) Variables.=0D =0D - Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.
=0D + Copyright (c) 2006 - 2024, Intel Corporation. All rights reserved.
=0D SPDX-License-Identifier: BSD-2-Clause-Patent=0D =0D @par Revision Reference:=0D @@ -183,4 +183,10 @@ extern EFI_GUID gEfiGlobalVariableGuid; ///=0D #define EFI_VENDOR_KEYS_VARIABLE_NAME L"VendorKeys"=0D =0D +///=0D +/// Whether the platform firmware is operating in device authentication bo= ot mode (1) or not (0).=0D +/// The content is UINT8.=0D +///=0D +#define EFI_DEVICE_AUTH_BOOT_MODE_NAME L"devAuthBoot"=0D +=0D #endif=0D diff --git a/MdePkg/Include/Guid/ImageAuthentication.h b/MdePkg/Include/Gui= d/ImageAuthentication.h index fe83596571..f95255c0fb 100644 --- a/MdePkg/Include/Guid/ImageAuthentication.h +++ b/MdePkg/Include/Guid/ImageAuthentication.h @@ -1,7 +1,7 @@ /** @file=0D Image signature database are defined for the signed image validation.=0D =0D - Copyright (c) 2009 - 2018, Intel Corporation. All rights reserved.
=0D + Copyright (c) 2009 - 2024, Intel Corporation. All rights reserved.
=0D SPDX-License-Identifier: BSD-2-Clause-Patent=0D =0D @par Revision Reference:=0D @@ -41,6 +41,9 @@ #define SETUP_MODE 1=0D #define USER_MODE 0=0D =0D +#define DEVICE_AUTH_BOOT_MODE_ENABLE 1=0D +#define DEVICE_AUTH_BOOT_MODE_DISABLE 0=0D +=0D // ***********************************************************************= =0D // Signature Database=0D // ***********************************************************************= =0D --=20 2.26.2.windows.1 -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#116423): https://edk2.groups.io/g/devel/message/116423 Mute This Topic: https://groups.io/mt/104761708/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=-