/* * refit/scan/entry_scan.h * * Copyright (c) 2006-2010 Christoph Pfisterer * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are * met: * * * Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * * Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the * distribution. * * * Neither the name of Christoph Pfisterer nor the names of the * contributors may be used to endorse or promote products derived * from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include "Platform.h" extern REFIT_MENU_ENTRY MenuEntryReturn; extern REFIT_MENU_ENTRY MenuEntryOptions; extern REFIT_MENU_ENTRY MenuEntryAbout; extern REFIT_MENU_ENTRY MenuEntryReset; extern REFIT_MENU_ENTRY MenuEntryShutdown; //extern REFIT_MENU_ENTRY MenuEntryHelp; extern REFIT_MENU_ENTRY MenuEntryExit; extern REFIT_MENU_SCREEN MainMenu; // common EG_IMAGE *LoadBuiltinIcon(IN CONST CHAR16 *IconName); LOADER_ENTRY * DuplicateLoaderEntry(IN LOADER_ENTRY *Entry); //CHAR16 *AddLoadOption(IN CHAR16 *LoadOptions, IN CHAR16 *LoadOption); //CHAR16 *RemoveLoadOption(IN CHAR16 *LoadOptions, IN CHAR16 *LoadOption); EG_IMAGE * ScanVolumeDefaultIcon(REFIT_VOLUME *Volume, IN UINT8 OSType, IN EFI_DEVICE_PATH_PROTOCOL *DevicePath); /* INTN StrniCmp(IN CHAR16 *Str1, IN CHAR16 *Str2, IN UINTN Count); CHAR16 *StriStr(IN CHAR16 *Str, IN CHAR16 *SearchFor); VOID StrToLower(IN CHAR16 *Str); VOID AlertMessage(IN CHAR16 *Title, IN CHAR16 *Message); BOOLEAN YesNoMessage(IN CHAR16 *Title, IN CHAR16 *Message); */ // Ask user for file path from directory menu BOOLEAN AskUserForFilePathFromDir(IN CHAR16 *Title OPTIONAL, IN REFIT_VOLUME *Volume, IN CHAR16 *ParentPath, IN EFI_FILE *Dir, OUT EFI_DEVICE_PATH_PROTOCOL **Result); // Ask user for file path from volumes menu BOOLEAN AskUserForFilePathFromVolumes(IN CHAR16 *Title OPTIONAL, OUT EFI_DEVICE_PATH_PROTOCOL **Result); // Ask user for file path BOOLEAN AskUserForFilePath(IN CHAR16 *Title OPTIONAL, IN EFI_DEVICE_PATH_PROTOCOL *Root OPTIONAL, OUT EFI_DEVICE_PATH_PROTOCOL **Result); // legacy VOID ScanLegacy(VOID); VOID AddCustomLegacy(VOID); // loader VOID ScanLoader(VOID); VOID AddCustomEntries(VOID); BOOLEAN IsCustomBootEntry(IN LOADER_ENTRY *Entry); // tool VOID ScanTool(VOID); VOID AddCustomTool(VOID); // locked graphics CONST CHAR16 *CustomBootModeToStr(IN UINT8 Mode); EFI_STATUS LockBootScreen(VOID); EFI_STATUS UnlockBootScreen(VOID); // secure boot #ifdef ENABLE_SECURE_BOOT #define PLATFORM_DATABASE_NAME L"PK" #define PLATFORM_DATABASE_GUID gEfiGlobalVariableGuid #define EXCHANGE_DATABASE_NAME L"KEK" #define EXCHANGE_DATABASE_GUID gEfiGlobalVariableGuid #define AUTHORIZED_DATABASE_NAME EFI_IMAGE_SECURITY_DATABASE #define AUTHORIZED_DATABASE_GUID gEfiImageSecurityDatabaseGuid #define UNAUTHORIZED_DATABASE_NAME EFI_IMAGE_SECURITY_DATABASE1 #define UNAUTHORIZED_DATABASE_GUID gEfiImageSecurityDatabaseGuid #define DEFAULT_PLATFORM_DATABASE_NAME L"PKDefault" #define DEFAULT_PLATFORM_DATABASE_GUID gEfiGlobalVariableGuid #define DEFAULT_EXCHANGE_DATABASE_NAME L"KEKDefault" #define DEFAULT_EXCHANGE_DATABASE_GUID gEfiGlobalVariableGuid #define DEFAULT_AUTHORIZED_DATABASE_NAME L"dbDefault" #define DEFAULT_AUTHORIZED_DATABASE_GUID gEfiGlobalVariableGuid #define DEFAULT_UNAUTHORIZED_DATABASE_NAME L"dbxDefault" #define DEFAULT_UNAUTHORIZED_DATABASE_GUID gEfiGlobalVariableGuid VOID AddSecureBootTool(VOID); VOID InitializeSecureBoot(VOID); EFI_STATUS InstallSecureBoot(VOID); VOID UninstallSecureBoot(VOID); VOID EnableSecureBoot(VOID); VOID DisableSecureBoot(VOID); BOOLEAN ConfigureSecureBoot(VOID); CONST CHAR16 *SecureBootPolicyToStr(IN UINTN Policy); EFI_STATUS VerifySecureBootImage(IN CONST EFI_DEVICE_PATH_PROTOCOL *DevicePath); UINTN QuerySecureBootUser(IN CONST EFI_DEVICE_PATH_PROTOCOL *DevicePath); EFI_STATUS EnrollSecureBootKeys(IN VOID *AuthorizedDatabase, IN UINTN AuthorizedDatabaseSize, IN BOOLEAN WantDefaultKeys); EFI_STATUS ClearSecureBootKeys(VOID); // secure boot database VOID *GetSignatureDatabase(IN CHAR16 *DatabaseName, IN EFI_GUID *DatabaseGuid, OUT UINTN *DatabaseSize); EFI_STATUS SetSignatureDatabase(IN CHAR16 *DatabaseName, IN EFI_GUID *DatabaseGuid, IN VOID *Database, IN UINTN DatabaseSize); // secure boot authorized database VOID *GetAuthorizedDatabase(UINTN *DatabaseSize); EFI_STATUS SetAuthorizedDatabase(IN VOID *Database, IN UINTN DatabaseSize); EFI_STATUS ClearAuthorizedDatabase(VOID); VOID *GetImageSignatureDatabase(IN VOID *FileBuffer, IN UINT64 FileSize, IN UINTN *DatabaseSize, IN BOOLEAN HashIfNoDatabase); EFI_STATUS AppendImageDatabaseToAuthorizedDatabase(IN VOID *Database, IN UINTN DatabaseSize); EFI_STATUS RemoveImageDatabaseFromAuthorizedDatabase(IN VOID *Database, IN UINTN DatabaseSize); EFI_STATUS AppendImageToAuthorizedDatabase(IN CONST EFI_DEVICE_PATH_PROTOCOL *DevicePath, IN VOID *FileBuffer, IN UINTN FileSize); EFI_STATUS RemoveImageFromAuthorizedDatabase(IN CONST EFI_DEVICE_PATH_PROTOCOL *DevicePath, IN VOID *FileBuffer, IN UINTN FileSize); EFI_STATUS AppendSignatureDatabaseToDatabase(IN OUT VOID **Database, IN OUT UINTN *DatabaseSize, IN VOID *SignatureDatabase, IN UINTN SignatureDatabaseSize); EFI_STATUS AppendSignatureToDatabase(IN OUT VOID **Database, IN OUT UINTN *DatabaseSize, IN EFI_GUID *SignatureType, IN VOID *Signature, IN UINTN SignatureSize); #endif //ENABLE_SECURE_BOOT