VirtualBox

Ignore:
Timestamp:
Oct 28, 2015 8:17:18 PM (9 years ago)
Author:
vboxsync
Message:

EFI/Firmware: 'svn merge /vendor/edk2/UDK2010.SR1 /vendor/edk2/current .', reverting and removing files+dirs listed in ReadMe.vbox, resolving conflicts with help from ../UDK2014.SP1/. This is a raw untested merge.

Location:
trunk/src/VBox/Devices/EFI/Firmware
Files:
2 edited

Legend:

Unmodified
Added
Removed
  • trunk/src/VBox/Devices/EFI/Firmware

  • trunk/src/VBox/Devices/EFI/Firmware/MdePkg/Include/Guid/ImageAuthentication.h

    r48674 r58459  
    11/** @file
    2   Platform Key, Key Exchange Key, and Image signature database are defined
    3   for the signed image validation.
    4 
    5   Copyright (c) 2009 - 2011, Intel Corporation. All rights reserved.<BR>
     2  Image signature database are defined for the signed image validation.
     3
     4  Copyright (c) 2009 - 2013, Intel Corporation. All rights reserved.<BR>
    65  This program and the accompanying materials                         
    76  are licensed and made available under the terms and conditions of the BSD License         
     
    3635///
    3736#define EFI_IMAGE_SECURITY_DATABASE1      L"dbx"
     37
    3838#define SECURE_BOOT_MODE_ENABLE           1
    3939#define SECURE_BOOT_MODE_DISABLE          0
    4040#define SETUP_MODE                        1
    4141#define USER_MODE                         0
    42 ///
    43 /// Globally "SetupMode" variable to specify whether the system is currently operating
    44 /// in setup mode (1) or not (0). All other values are reserved.
    45 ///
    46 #define EFI_SETUP_MODE_NAME               L"SetupMode"
    47 ///
    48 /// Globally "PK" variable for the Platform Key Signature Database.
    49 ///
    50 #define EFI_PLATFORM_KEY_NAME             L"PK"
    51 ///
    52 /// Globally "KEK" variable for the Key Exchange Key Signature Database.
    53 ///
    54 #define EFI_KEY_EXCHANGE_KEY_NAME         L"KEK"
    55 ///
    56 /// Globally "SignatureSupport" variable returns an array of GUIDs,
    57 /// with each GUID representing a type of signature which the platform
    58 /// firmware supports for images and other data.
    59 ///
    60 #define EFI_SIGNATURE_SUPPORT_NAME        L"SignatureSupport"
    61 
    62 ///
    63 /// Globally "SecureBoot" variable to specify whether the platform firmware
    64 /// is operating in Secure boot mode (1) or not (0). All other values are reserved.
    65 ///
    66 #define EFI_SECURE_BOOT_MODE_NAME         L"SecureBoot"
     42
    6743
    6844//***********************************************************************
Note: See TracChangeset for help on using the changeset viewer.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette