2
This includes some definitions introduced in UEFI that will be used in both PEI and DXE phases.
4
Copyright (c) 2006 - 2015, Intel Corporation. All rights reserved.<BR>
5
This program and the accompanying materials are licensed and made available under
6
the terms and conditions of the BSD License that accompanies this distribution.
7
The full text of the license may be found at
8
http://opensource.org/licenses/bsd-license.php.
10
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
11
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
15
#ifndef __UEFI_MULTIPHASE_H__
16
#define __UEFI_MULTIPHASE_H__
18
FILE_LICENCE ( BSD3 );
20
#include <ipxe/efi/Guid/WinCertificate.h>
22
/// Enumeration of memory types introduced in UEFI.
28
EfiReservedMemoryType,
30
/// The code portions of a loaded application.
31
/// (Note that UEFI OS loaders are UEFI applications.)
35
/// The data portions of a loaded application and the default data allocation
36
/// type used by an application to allocate pool memory.
40
/// The code portions of a loaded Boot Services Driver.
44
/// The data portions of a loaded Boot Serves Driver, and the default data
45
/// allocation type used by a Boot Services Driver to allocate pool memory.
49
/// The code portions of a loaded Runtime Services Driver.
51
EfiRuntimeServicesCode,
53
/// The data portions of a loaded Runtime Services Driver and the default
54
/// data allocation type used by a Runtime Services Driver to allocate pool memory.
56
EfiRuntimeServicesData,
58
/// Free (unallocated) memory.
60
EfiConventionalMemory,
62
/// Memory in which errors have been detected.
66
/// Memory that holds the ACPI tables.
70
/// Address space reserved for use by the firmware.
74
/// Used by system firmware to request that a memory-mapped IO region
75
/// be mapped by the OS to a virtual address so it can be accessed by EFI runtime services.
79
/// System memory-mapped IO region that is used to translate memory
80
/// cycles to IO cycles by the processor.
82
EfiMemoryMappedIOPortSpace,
84
/// Address space reserved by the firmware for code that is part of the processor.
88
/// A memory region that operates as EfiConventionalMemory,
89
/// however it happens to also support byte-addressable non-volatility.
96
/// Enumeration of reset types.
100
/// Used to induce a system-wide reset. This sets all circuitry within the
101
/// system to its initial state. This type of reset is asynchronous to system
102
/// operation and operates withgout regard to cycle boundaries. EfiColdReset
103
/// is tantamount to a system power cycle.
107
/// Used to induce a system-wide initialization. The processors are set to their
108
/// initial state, and pending cycles are not corrupted. If the system does
109
/// not support this reset type, then an EfiResetCold must be performed.
113
/// Used to induce an entry into a power state equivalent to the ACPI G2/S5 or G3
114
/// state. If the system does not support this reset type, then when the system
115
/// is rebooted, it should exhibit the EfiResetCold attributes.
119
/// Used to induce a system-wide reset. The exact type of the reset is defined by
120
/// the EFI_GUID that follows the Null-terminated Unicode string passed into
121
/// ResetData. If the platform does not recognize the EFI_GUID in ResetData the
122
/// platform must pick a supported reset type to perform. The platform may
123
/// optionally log the parameters from any non-normal reset that occurs.
125
EfiResetPlatformSpecific
129
/// Data structure that precedes all of the standard EFI table types.
133
/// A 64-bit signature that identifies the type of table that follows.
134
/// Unique signatures have been generated for the EFI System Table,
135
/// the EFI Boot Services Table, and the EFI Runtime Services Table.
139
/// The revision of the EFI Specification to which this table
140
/// conforms. The upper 16 bits of this field contain the major
141
/// revision value, and the lower 16 bits contain the minor revision
142
/// value. The minor revision values are limited to the range of 00..99.
146
/// The size, in bytes, of the entire table including the EFI_TABLE_HEADER.
150
/// The 32-bit CRC for the entire table. This value is computed by
151
/// setting this field to 0, and computing the 32-bit CRC for HeaderSize bytes.
155
/// Reserved field that must be set to 0.
161
/// Attributes of variable.
163
#define EFI_VARIABLE_NON_VOLATILE 0x00000001
164
#define EFI_VARIABLE_BOOTSERVICE_ACCESS 0x00000002
165
#define EFI_VARIABLE_RUNTIME_ACCESS 0x00000004
167
/// This attribute is identified by the mnemonic 'HR'
168
/// elsewhere in this specification.
170
#define EFI_VARIABLE_HARDWARE_ERROR_RECORD 0x00000008
172
/// Attributes of Authenticated Variable
174
#define EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS 0x00000010
175
#define EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS 0x00000020
176
#define EFI_VARIABLE_APPEND_WRITE 0x00000040
180
/// AuthInfo is a WIN_CERTIFICATE using the wCertificateType
181
/// WIN_CERTIFICATE_UEFI_GUID and the CertType
182
/// EFI_CERT_TYPE_RSA2048_SHA256_GUID. If the attribute specifies
183
/// authenticated access, then the Data buffer should begin with an
184
/// authentication descriptor prior to the data payload and DataSize
185
/// should reflect the the data.and descriptor size. The caller
186
/// shall digest the Monotonic Count value and the associated data
187
/// for the variable update using the SHA-256 1-way hash algorithm.
188
/// The ensuing the 32-byte digest will be signed using the private
189
/// key associated w/ the public/private 2048-bit RSA key-pair. The
190
/// WIN_CERTIFICATE shall be used to describe the signature of the
191
/// Variable data *Data. In addition, the signature will also
192
/// include the MonotonicCount value to guard against replay attacks.
196
/// Included in the signature of
197
/// AuthInfo.Used to ensure freshness/no
198
/// replay. Incremented during each
201
UINT64 MonotonicCount;
203
/// Provides the authorization for the variable
204
/// access. It is a signature across the
205
/// variable data and the Monotonic Count
206
/// value. Caller uses Private key that is
207
/// associated with a public key that has been
208
/// provisioned via the key exchange.
210
WIN_CERTIFICATE_UEFI_GUID AuthInfo;
211
} EFI_VARIABLE_AUTHENTICATION;
214
/// When the attribute EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS is
215
/// set, then the Data buffer shall begin with an instance of a complete (and serialized)
216
/// EFI_VARIABLE_AUTHENTICATION_2 descriptor. The descriptor shall be followed by the new
217
/// variable value and DataSize shall reflect the combined size of the descriptor and the new
218
/// variable value. The authentication descriptor is not part of the variable data and is not
219
/// returned by subsequent calls to GetVariable().
223
/// For the TimeStamp value, components Pad1, Nanosecond, TimeZone, Daylight and
224
/// Pad2 shall be set to 0. This means that the time shall always be expressed in GMT.
228
/// Only a CertType of EFI_CERT_TYPE_PKCS7_GUID is accepted.
230
WIN_CERTIFICATE_UEFI_GUID AuthInfo;
231
} EFI_VARIABLE_AUTHENTICATION_2;