mirror of
https://github.com/CloverHackyColor/CloverBootloader.git
synced 2024-12-25 16:37:42 +01:00
163 lines
7.5 KiB
C
163 lines
7.5 KiB
C
|
/*
|
||
|
* refit/scan/entry_scan.h
|
||
|
*
|
||
|
* Copyright (c) 2006-2010 Christoph Pfisterer
|
||
|
* All rights reserved.
|
||
|
*
|
||
|
* Redistribution and use in source and binary forms, with or without
|
||
|
* modification, are permitted provided that the following conditions are
|
||
|
* met:
|
||
|
*
|
||
|
* * Redistributions of source code must retain the above copyright
|
||
|
* notice, this list of conditions and the following disclaimer.
|
||
|
*
|
||
|
* * Redistributions in binary form must reproduce the above copyright
|
||
|
* notice, this list of conditions and the following disclaimer in the
|
||
|
* documentation and/or other materials provided with the
|
||
|
* distribution.
|
||
|
*
|
||
|
* * Neither the name of Christoph Pfisterer nor the names of the
|
||
|
* contributors may be used to endorse or promote products derived
|
||
|
* from this software without specific prior written permission.
|
||
|
*
|
||
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
||
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
||
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
||
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
||
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
||
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
||
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
||
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
||
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||
|
*/
|
||
|
|
||
|
#include "Platform.h"
|
||
|
|
||
|
extern REFIT_MENU_ENTRY MenuEntryReturn;
|
||
|
extern REFIT_MENU_ENTRY MenuEntryOptions;
|
||
|
extern REFIT_MENU_ENTRY MenuEntryAbout;
|
||
|
extern REFIT_MENU_ENTRY MenuEntryReset;
|
||
|
extern REFIT_MENU_ENTRY MenuEntryShutdown;
|
||
|
//extern REFIT_MENU_ENTRY MenuEntryHelp;
|
||
|
extern REFIT_MENU_ENTRY MenuEntryExit;
|
||
|
extern REFIT_MENU_SCREEN MainMenu;
|
||
|
|
||
|
// common
|
||
|
EG_IMAGE *LoadBuiltinIcon(IN CHAR16 *IconName);
|
||
|
LOADER_ENTRY * DuplicateLoaderEntry(IN LOADER_ENTRY *Entry);
|
||
|
//CHAR16 *AddLoadOption(IN CHAR16 *LoadOptions, IN CHAR16 *LoadOption);
|
||
|
//CHAR16 *RemoveLoadOption(IN CHAR16 *LoadOptions, IN CHAR16 *LoadOption);
|
||
|
EG_IMAGE * ScanVolumeDefaultIcon(REFIT_VOLUME *Volume, IN UINT8 OSType, IN EFI_DEVICE_PATH_PROTOCOL *DevicePath);
|
||
|
/*
|
||
|
INTN StrniCmp(IN CHAR16 *Str1,
|
||
|
IN CHAR16 *Str2,
|
||
|
IN UINTN Count);
|
||
|
CHAR16 *StriStr(IN CHAR16 *Str,
|
||
|
IN CHAR16 *SearchFor);
|
||
|
VOID StrToLower(IN CHAR16 *Str);
|
||
|
VOID AlertMessage(IN CHAR16 *Title, IN CHAR16 *Message);
|
||
|
BOOLEAN YesNoMessage(IN CHAR16 *Title, IN CHAR16 *Message);
|
||
|
*/
|
||
|
|
||
|
// Ask user for file path from directory menu
|
||
|
BOOLEAN AskUserForFilePathFromDir(IN CHAR16 *Title OPTIONAL, IN REFIT_VOLUME *Volume,
|
||
|
IN CHAR16 *ParentPath, IN EFI_FILE *Dir,
|
||
|
OUT EFI_DEVICE_PATH_PROTOCOL **Result);
|
||
|
// Ask user for file path from volumes menu
|
||
|
BOOLEAN AskUserForFilePathFromVolumes(IN CHAR16 *Title OPTIONAL, OUT EFI_DEVICE_PATH_PROTOCOL **Result);
|
||
|
// Ask user for file path
|
||
|
BOOLEAN AskUserForFilePath(IN CHAR16 *Title OPTIONAL, IN EFI_DEVICE_PATH_PROTOCOL *Root OPTIONAL, OUT EFI_DEVICE_PATH_PROTOCOL **Result);
|
||
|
|
||
|
// legacy
|
||
|
VOID ScanLegacy(VOID);
|
||
|
VOID AddCustomLegacy(VOID);
|
||
|
|
||
|
// loader
|
||
|
VOID ScanLoader(VOID);
|
||
|
VOID AddCustomEntries(VOID);
|
||
|
BOOLEAN IsCustomBootEntry(IN LOADER_ENTRY *Entry);
|
||
|
|
||
|
// tool
|
||
|
VOID ScanTool(VOID);
|
||
|
VOID AddCustomTool(VOID);
|
||
|
|
||
|
// locked graphics
|
||
|
CHAR16 *CustomBootModeToStr(IN UINT8 Mode);
|
||
|
EFI_STATUS LockBootScreen(VOID);
|
||
|
EFI_STATUS UnlockBootScreen(VOID);
|
||
|
|
||
|
// secure boot
|
||
|
#ifdef ENABLE_SECURE_BOOT
|
||
|
#define PLATFORM_DATABASE_NAME L"PK"
|
||
|
#define PLATFORM_DATABASE_GUID gEfiGlobalVariableGuid
|
||
|
#define EXCHANGE_DATABASE_NAME L"KEK"
|
||
|
#define EXCHANGE_DATABASE_GUID gEfiGlobalVariableGuid
|
||
|
#define AUTHORIZED_DATABASE_NAME EFI_IMAGE_SECURITY_DATABASE
|
||
|
#define AUTHORIZED_DATABASE_GUID gEfiImageSecurityDatabaseGuid
|
||
|
#define UNAUTHORIZED_DATABASE_NAME EFI_IMAGE_SECURITY_DATABASE1
|
||
|
#define UNAUTHORIZED_DATABASE_GUID gEfiImageSecurityDatabaseGuid
|
||
|
#define DEFAULT_PLATFORM_DATABASE_NAME L"PKDefault"
|
||
|
#define DEFAULT_PLATFORM_DATABASE_GUID gEfiGlobalVariableGuid
|
||
|
#define DEFAULT_EXCHANGE_DATABASE_NAME L"KEKDefault"
|
||
|
#define DEFAULT_EXCHANGE_DATABASE_GUID gEfiGlobalVariableGuid
|
||
|
#define DEFAULT_AUTHORIZED_DATABASE_NAME L"dbDefault"
|
||
|
#define DEFAULT_AUTHORIZED_DATABASE_GUID gEfiGlobalVariableGuid
|
||
|
#define DEFAULT_UNAUTHORIZED_DATABASE_NAME L"dbxDefault"
|
||
|
#define DEFAULT_UNAUTHORIZED_DATABASE_GUID gEfiGlobalVariableGuid
|
||
|
|
||
|
VOID AddSecureBootTool(VOID);
|
||
|
VOID InitializeSecureBoot(VOID);
|
||
|
EFI_STATUS InstallSecureBoot(VOID);
|
||
|
VOID UninstallSecureBoot(VOID);
|
||
|
VOID EnableSecureBoot(VOID);
|
||
|
VOID DisableSecureBoot(VOID);
|
||
|
BOOLEAN ConfigureSecureBoot(VOID);
|
||
|
CONST CHAR16 *SecureBootPolicyToStr(IN UINTN Policy);
|
||
|
EFI_STATUS VerifySecureBootImage(IN CONST EFI_DEVICE_PATH_PROTOCOL *DevicePath);
|
||
|
UINTN QuerySecureBootUser(IN CONST EFI_DEVICE_PATH_PROTOCOL *DevicePath);
|
||
|
EFI_STATUS EnrollSecureBootKeys(IN VOID *AuthorizedDatabase,
|
||
|
IN UINTN AuthorizedDatabaseSize,
|
||
|
IN BOOLEAN WantDefaultKeys);
|
||
|
EFI_STATUS ClearSecureBootKeys(VOID);
|
||
|
|
||
|
// secure boot database
|
||
|
VOID *GetSignatureDatabase(IN CHAR16 *DatabaseName,
|
||
|
IN EFI_GUID *DatabaseGuid,
|
||
|
OUT UINTN *DatabaseSize);
|
||
|
EFI_STATUS SetSignatureDatabase(IN CHAR16 *DatabaseName,
|
||
|
IN EFI_GUID *DatabaseGuid,
|
||
|
IN VOID *Database,
|
||
|
IN UINTN DatabaseSize);
|
||
|
|
||
|
// secure boot authorized database
|
||
|
VOID *GetAuthorizedDatabase(UINTN *DatabaseSize);
|
||
|
EFI_STATUS SetAuthorizedDatabase(IN VOID *Database,
|
||
|
IN UINTN DatabaseSize);
|
||
|
EFI_STATUS ClearAuthorizedDatabase(VOID);
|
||
|
VOID *GetImageSignatureDatabase(IN VOID *FileBuffer,
|
||
|
IN UINT64 FileSize,
|
||
|
IN UINTN *DatabaseSize,
|
||
|
IN BOOLEAN HashIfNoDatabase);
|
||
|
EFI_STATUS AppendImageDatabaseToAuthorizedDatabase(IN VOID *Database,
|
||
|
IN UINTN DatabaseSize);
|
||
|
EFI_STATUS RemoveImageDatabaseFromAuthorizedDatabase(IN VOID *Database,
|
||
|
IN UINTN DatabaseSize);
|
||
|
EFI_STATUS AppendImageToAuthorizedDatabase(IN CONST EFI_DEVICE_PATH_PROTOCOL *DevicePath,
|
||
|
IN VOID *FileBuffer,
|
||
|
IN UINTN FileSize);
|
||
|
EFI_STATUS RemoveImageFromAuthorizedDatabase(IN CONST EFI_DEVICE_PATH_PROTOCOL *DevicePath,
|
||
|
IN VOID *FileBuffer,
|
||
|
IN UINTN FileSize);
|
||
|
EFI_STATUS AppendSignatureDatabaseToDatabase(IN OUT VOID **Database,
|
||
|
IN OUT UINTN *DatabaseSize,
|
||
|
IN VOID *SignatureDatabase,
|
||
|
IN UINTN SignatureDatabaseSize);
|
||
|
EFI_STATUS AppendSignatureToDatabase(IN OUT VOID **Database,
|
||
|
IN OUT UINTN *DatabaseSize,
|
||
|
IN EFI_GUID *SignatureType,
|
||
|
IN VOID *Signature,
|
||
|
IN UINTN SignatureSize);
|
||
|
#endif //ENABLE_SECURE_BOOT
|