From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by spool.mail.gandi.net (Postfix) with ESMTPS id E47F0AC0997 for ; Tue, 2 Apr 2024 02:31:38 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=0JNxLHjAyQ/JgbwqFhkNZJjH6LmvFc6UClI67Evei44=; c=relaxed/simple; d=groups.io; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Resent-Date:Resent-From:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Transfer-Encoding; s=20240206; t=1712025097; v=1; b=WQezDMHqnKpMpXTaxE/6JSvm5BXBd1jnZ3vM48nGhaWrWx7d3eqYxu0r9rhRznuwqbY27huS Y5k89muSufoIFVuRdpOHYBV5kKl+hJGUmrLwG2O5R403v1YwNEcZV+7zIpKdLAvHJc3g1J/eqEV EsE6B17yTpzk24G6+LmB/s6W1OR4ofds04teJTCJ51IsJGy9L8iUZ2wd1J1c7DxcqpDTOPaKjkt gm4A+elU1YSRFcX5Hf1EWcc1Om7pedZTpSvcScip7Jlp2qk2vzA/fD+CHZn9Wu/SgLVJ3dEvg+s W00ku/XweWAxHma6/l/936hjsZtubSusnqNBu+xp7eQPw== X-Received: by 127.0.0.2 with SMTP id gugdYY7687511xk5xlYhTfe0; Mon, 01 Apr 2024 19:31:37 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.15]) by mx.groups.io with SMTP id smtpd.web10.3286.1712025091304236795 for ; Mon, 01 Apr 2024 19:31:36 -0700 X-CSE-ConnectionGUID: zbsQ9+J7T8ye8Ty273dVAg== X-CSE-MsgGUID: rvsK5OVNQ7OaXMkcgdsYRA== X-IronPort-AV: E=McAfee;i="6600,9927,11031"; a="7362552" X-IronPort-AV: E=Sophos;i="6.07,173,1708416000"; d="scan'208";a="7362552" X-Received: from orviesa007.jf.intel.com ([10.64.159.147]) by fmvoesa109.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 Apr 2024 19:31:37 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.07,173,1708416000"; d="scan'208";a="18307377" X-Received: from shwdejointd777.ccr.corp.intel.com ([10.239.58.116]) by orviesa007.jf.intel.com with ESMTP; 01 Apr 2024 19:31:35 -0700 From: "Wenxing Hou" To: devel@edk2.groups.io Cc: Michael D Kinney , Liming Gao , Zhiguang Liu , Jiewen Yao Subject: [edk2-devel] [PATCH 3/9] MdePkg: Add devAuthBoot GlobalVariable Date: Tue, 2 Apr 2024 10:31:19 +0800 Message-Id: <20240402023125.4168-4-wenxing.hou@intel.com> In-Reply-To: <20240402023125.4168-1-wenxing.hou@intel.com> References: <20240402023125.4168-1-wenxing.hou@intel.com> MIME-Version: 1.0 Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Resent-Date: Mon, 01 Apr 2024 19:31:36 -0700 Resent-From: wenxing.hou@intel.com Reply-To: devel@edk2.groups.io,wenxing.hou@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: hTk3VHraXNiB6pdpCAtkztfix7686176AA= Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20240206 header.b=WQezDMHq; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io According to UEFI 2.10 spec 3.3 Globally Defined Variables section, add devAuthBoot GlobalVariable. Cc: Michael D Kinney Cc: Liming Gao Cc: Zhiguang Liu Cc: Jiewen Yao Signed-off-by: Wenxing Hou --- MdePkg/Include/Guid/GlobalVariable.h | 8 +++++++- MdePkg/Include/Guid/ImageAuthentication.h | 5 ++++- 2 files changed, 11 insertions(+), 2 deletions(-) diff --git a/MdePkg/Include/Guid/GlobalVariable.h b/MdePkg/Include/Guid/Glo= balVariable.h index eb2ce6aaf2..eb6e5a043e 100644 --- a/MdePkg/Include/Guid/GlobalVariable.h +++ b/MdePkg/Include/Guid/GlobalVariable.h @@ -1,7 +1,7 @@ /** @file=0D GUID for EFI (NVRAM) Variables.=0D =0D - Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.
=0D + Copyright (c) 2006 - 2024, Intel Corporation. All rights reserved.
=0D SPDX-License-Identifier: BSD-2-Clause-Patent=0D =0D @par Revision Reference:=0D @@ -183,4 +183,10 @@ extern EFI_GUID gEfiGlobalVariableGuid; ///=0D #define EFI_VENDOR_KEYS_VARIABLE_NAME L"VendorKeys"=0D =0D +///=0D +/// Whether the platform firmware is operating in device authentication bo= ot mode (1) or not (0).=0D +/// The content is UINT8.=0D +///=0D +#define EFI_DEVICE_AUTH_BOOT_MODE_NAME L"devAuthBoot"=0D +=0D #endif=0D diff --git a/MdePkg/Include/Guid/ImageAuthentication.h b/MdePkg/Include/Gui= d/ImageAuthentication.h index fe83596571..f95255c0fb 100644 --- a/MdePkg/Include/Guid/ImageAuthentication.h +++ b/MdePkg/Include/Guid/ImageAuthentication.h @@ -1,7 +1,7 @@ /** @file=0D Image signature database are defined for the signed image validation.=0D =0D - Copyright (c) 2009 - 2018, Intel Corporation. All rights reserved.
=0D + Copyright (c) 2009 - 2024, Intel Corporation. All rights reserved.
=0D SPDX-License-Identifier: BSD-2-Clause-Patent=0D =0D @par Revision Reference:=0D @@ -41,6 +41,9 @@ #define SETUP_MODE 1=0D #define USER_MODE 0=0D =0D +#define DEVICE_AUTH_BOOT_MODE_ENABLE 1=0D +#define DEVICE_AUTH_BOOT_MODE_DISABLE 0=0D +=0D // ***********************************************************************= =0D // Signature Database=0D // ***********************************************************************= =0D --=20 2.26.2.windows.1 -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#117308): https://edk2.groups.io/g/devel/message/117308 Mute This Topic: https://groups.io/mt/105281050/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=-