Searched full:uefi (Results 1 – 25 of 295) sorted by relevance
12345678910>>...12
7 # UEFI on U-Boot9 The Unified Extensible Firmware Interface Specification (UEFI) [1] has become17 The implementation of UEFI in U-Boot strives to reach the minimum requirements21 A full blown UEFI implementation would contradict the U-Boot design principle24 ## Building for UEFI26 The UEFI standard supports only little-endian systems. The UEFI support can be35 loaded UEFI application [3], requires40 ### Executing a UEFI binary42 The bootefi command is used to start UEFI applications or to install UEFI47 * image address - the memory address of the UEFI binary[all …]
2 UEFI Secure Boot information and represents properties for managing the UEFI9 The UEFI Secure Boot state during the current boot cycle.15 An indication of whether the UEFI Secure Boot takes effect on next21 The current UEFI Secure Boot Mode.31 UEFI Secure Boot is currently unknown.34 UEFI Secure Boot is currently enabled.37 UEFI Secure Boot is currently disabled.41 Secure Boot Mode Type. UEFI Secure Boot Modes are defined in UEFI43 https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html#secure-boot-modes47 UEFI Secure Boot is currently unknown.[all …]
39 ... UEFI=BIOS EFI boot51 Once Hdd UEFI52 Once Pxe UEFI53 Once Diags UEFI54 Once Cd UEFI55 Once BiosSetup UEFI56 Once None UEFI71 Continuous Hdd UEFI72 Continuous Pxe UEFI73 Continuous Diags UEFI[all …]
60 "description": "This action resets the UEFI Secure Boot keys.",61 …UEFI Secure Boot key databases. The `ResetAllKeysToDefault` value shall reset all UEFI Secure Boo…65 … "description": "The type of reset or delete to perform on the UEFI Secure Boot databases.",66 …his parameter shall specify the type of reset or delete to perform on the UEFI Secure Boot databas…104 …"DeleteAllKeys": "Delete the contents of all UEFI Secure Boot key databases, including the PK key …105 …"DeletePK": "Delete the contents of the PK UEFI Secure Boot database. This puts the system in Set…106 …"ResetAllKeysToDefault": "Reset the contents of all UEFI Secure Boot key databases, including the …112 …n": "The `SecureBoot` schema contains UEFI Secure Boot information and represents properties for m…113 …"longDescription": "This resource contains UEFI Secure Boot information for a Redfish implementati…179 "description": "The UEFI Secure Boot state during the current boot cycle.",[all …]
60 … "description": "This action is used to reset the UEFI Secure Boot keys of this database.",61 …UEFI Secure Boot key database. The `ResetAllKeysToDefault` value shall reset this UEFI Secure Boo…65 … "description": "The type of reset or delete to perform on this UEFI Secure Boot database.",66 …is parameter shall specify the type of reset or delete to perform on this UEFI Secure Boot databas…103 "DeleteAllKeys": "Delete the contents of this UEFI Secure Boot key database.",104 …"ResetAllKeysToDefault": "Reset the contents of this UEFI Secure Boot key database to the default …110 …"description": "The `SecureBootDatabase` schema describes a UEFI Secure Boot database used to stor…111 …"longDescription": "This resource shall be used to represent a UEFI Secure Boot database for a Red…146 …"description": "A link to the collection of certificates contained in this UEFI Secure Boot databa…151 … "description": "This property contains the name of the UEFI Secure Boot database.",[all …]
2 UEFI variables5 Guest UEFI variable management8 The traditional approach for UEFI Variable storage in qemu guests is13 Secure boot support comes with the requirement that the UEFI variable27 Host UEFI variable service36 The ``uefi-vars`` device implements the UEFI virtual device. It comes37 in ``uefi-vars-x86`` and ``uefi-vars-sysbus`` flavours. The device60 -device uefi-vars-x86,jsonfile=/path/to/vars.json68 -device uefi-vars-sysbus,jsonfile=/path/to/vars.json
1 SUMMARY = "Various data structures and parsing tools for UEFI firmware."2 DESCRIPTION = "This package contains Python UEFI firmware parser tool. The \3 UEFI firmware parser is a simple module and set of scripts for parsing, \4 extracting, and recreating UEFI firmware volumes. This includes parsing \6 HOMEPAGE = "https://github.com/theopolis/uefi-firmware-parser"10 SRC_URI = "git://github.com/theopolis/uefi-firmware-parser;protocol=https;branch=master"
3 * UEFI Shell-like command22 * efi_get_device_handle_info() - get information of UEFI device24 * @handle: Handle of UEFI device52 * do_efi_show_devices() - show UEFI devices61 * Show all UEFI devices and their information.94 * efi_get_driver_handle_info() - get information of UEFI driver96 * @handle: Handle of UEFI device101 * Currently return no useful information as all UEFI drivers are131 * do_efi_show_drivers() - show UEFI drivers140 * Show all UEFI drivers and their information.[all …]
3 * Integrate UEFI variables to u-boot env interface20 * Mapping between UEFI variables and u-boot variables:37 * efi_dump_single_var() - show information about a UEFI variable42 * Show information encoded in one UEFI variable88 * efi_dump_vars() - show information about named UEFI variables94 * Show information encoded in named UEFI variables131 * efi_dump_vars() - show information about all the UEFI variables135 * Show information encoded in all the UEFI variables182 * do_env_print_efi() - show information about UEFI variables193 * named UEFI variables, otherwise show all the UEFI variables.[all …]
37 …ing="The `SecureBoot` schema contains UEFI Secure Boot information and represents properties for m…38 …<Annotation Term="OData.LongDescription" String="This resource contains UEFI Secure Boot informati…65 … <Annotation Term="OData.Description" String="This action resets the UEFI Secure Boot keys."/>66 …UEFI Secure Boot key databases. The `ResetAllKeysToDefault` value shall reset all UEFI Secure Boo…69 …"OData.Description" String="The type of reset or delete to perform on the UEFI Secure Boot databas…70 …his parameter shall specify the type of reset or delete to perform on the UEFI Secure Boot databas…82 …<Annotation Term="OData.Description" String="An indication of whether UEFI Secure Boot is enabled.…83 …property shall indicate whether the UEFI Secure Boot takes effect on next boot. This property can…87 …<Annotation Term="OData.Description" String="The UEFI Secure Boot state during the current boot cy…88 …<Annotation Term="OData.LongDescription" String="This property shall indicate the UEFI Secure Boot…[all …]
40 …m="OData.Description" String="The `SecureBootDatabase` schema describes a UEFI Secure Boot databas…41 …OData.LongDescription" String="This resource shall be used to represent a UEFI Secure Boot databas…67 …<Annotation Term="OData.Description" String="This action is used to reset the UEFI Secure Boot key…68 …UEFI Secure Boot key database. The `ResetAllKeysToDefault` value shall reset this UEFI Secure Boo…71 …OData.Description" String="The type of reset or delete to perform on this UEFI Secure Boot databas…72 …is parameter shall specify the type of reset or delete to perform on this UEFI Secure Boot databas…84 …<Annotation Term="OData.Description" String="This property contains the name of the UEFI Secure Bo…85 …name of the UEFI Secure Boot database. This property shall contain the same value as the `Id` pro…93 …ption" String="A link to the collection of certificates contained in this UEFI Secure Boot databas…99 …ription" String="A link to the collection of signatures contained in this UEFI Secure Boot databas…[all …]
1 DESCRIPTION = "Trusted Services uefi-test deployment for arm-linux. \3 on an Arm platform with real deployments of UEFI SMM services."12 OECMAKE_SOURCEPATH = "${S}/deployments/uefi-test/${TS_ENV}"14 FILES:${PN} = "${bindir}/uefi-test"18 mv ${D}${TS_INSTALL}/bin/uefi-test ${D}${bindir}
7 # UEFI Variable Store10 # The QEMU efi variable store implementation (hw/uefi/) uses this to21 # UEFI Variable. Check the UEFI specifification for more detailed38 # of updates for authenticated variables. UEFI has two kinds of60 # @variables: list of UEFI variables
1 # Makefile for the test helper UEFI applications that run in guests.14 images_dir := ../data/uefi-boot-images27 # to the UEFI source code. Normally, the intermediate files would have been29 # from the unchanged UEFI sources. Unfortunately, the "mkdosfs" and48 # Embed the "UEFI system partition" into an ISO9660 file system as an ElTorito55 # *short* UEFI architecture identifiers. Periods are allowed in, and ultimately65 # Format a "UEFI system partition", using the UEFI binary as the default boot68 # after the UEFI binary. (Excess characters are automatically dropped from the82 # association between the UEFI binary (such as "bios-tables-test") and the101 $(PYTHON) ../../roms/edk2-build.py --config uefi-test-build.config \
4 * uefi-vars device - API of the virtual device for guest/host communication.10 #define TYPE_UEFI_VARS_X64 "uefi-vars-x64"11 #define TYPE_UEFI_VARS_SYSBUS "uefi-vars-sysbus"14 #define UEFI_VARS_FDT_NODE "qemu-uefi-vars"15 #define UEFI_VARS_FDT_COMPAT "qemu,uefi-vars"
21 * See the Unified Extensible Firmware Interface (UEFI) specification45 * The UEFI spec does not indicate what happens to the end tag. We follow the49 * See the Unified Extensible Firmware Interface (UEFI) specification68 * See the Unified Extensible Firmware Interface (UEFI) specification89 * See the Unified Extensible Firmware Interface (UEFI) specification110 * See the Unified Extensible Firmware Interface (UEFI) specification132 * See the Unified Extensible Firmware Interface (UEFI) specification154 * See the Unified Extensible Firmware Interface (UEFI) specification174 * See the Unified Extensible Firmware Interface (UEFI) specification
54 * efi_to_native() - convert the UEFI variable name and vendor GUID to U-Boot58 * encoded vendor GUID, and the UTF-8 encoded UEFI variable name separated by62 * @variable_name: UEFI variable name104 * Convert the string encoded attributes of a UEFI variable to a bit mask.108 * @attrp: pointer to UEFI attributes149 * efi_efi_get_variable() - retrieve value of a UEFI variable153 * See the Unified Extensible Firmware Interface (UEFI) specification for245 * parse_uboot_variable() - parse a u-boot variable and get uefi-related249 * @variable_name: name of uefi variable in u16, null-terminated253 * A uefi variable is encoded into a u-boot variable as described above.[all …]
27 #include <Uefi/UefiBaseType.h>50 // bit-flipping occurs in order not to store the actual GUID in any UEFI60 // zero (independently of the other) if the UEFI System Table does not61 // provide the corresponding UEFI Configuration Table.72 // (independently of the other) if the UEFI System Table does not provide the73 // corresponding UEFI Configuration Table.
12 UEFI, enumerator17 {SignatureTypeRegistry::UEFI, "UEFI"},
3 SRC_URI += "file://uefi-secureboot.cfg"7 require ${@bb.utils.contains('MACHINE_FEATURES', 'uefi-http-boot', 'u-boot-uefi-http-boot.inc', '',…8 require ${@bb.utils.contains('MACHINE_FEATURES', 'uefi-capsule-update', 'u-boot-capsule-update.inc'…
3 # UEFI Secure Boot: A mechanism to ensure that only trusted software is executed26 MACHINE_FEATURES:append = " efi uefi-secureboot uefi-http-boot uefi-capsule-updates"
4 Subject: [PATCH 3/3] Revert "Make constraints of NV UEFI variables persistent"21 diff --git a/components/service/uefi/smm_variable/backend/test/variable_index_tests.cpp b/component…23 --- a/components/service/uefi/smm_variable/backend/test/variable_index_tests.cpp24 +++ b/components/service/uefi/smm_variable/backend/test/variable_index_tests.cpp181 diff --git a/components/service/uefi/smm_variable/backend/uefi_variable_store.c b/components/servic…183 --- a/components/service/uefi/smm_variable/backend/uefi_variable_store.c184 +++ b/components/service/uefi/smm_variable/backend/uefi_variable_store.c216 diff --git a/components/service/uefi/smm_variable/backend/variable_index.c b/components/service/uef…218 --- a/components/service/uefi/smm_variable/backend/variable_index.c219 +++ b/components/service/uefi/smm_variable/backend/variable_index.c[all …]
26 diff --git a/components/service/uefi/smm_variable/backend/test/variable_index_tests.cpp b/component…28 --- a/components/service/uefi/smm_variable/backend/test/variable_index_tests.cpp29 +++ b/components/service/uefi/smm_variable/backend/test/variable_index_tests.cpp156 diff --git a/components/service/uefi/smm_variable/backend/test/variable_store_tests.cpp b/component…158 --- a/components/service/uefi/smm_variable/backend/test/variable_store_tests.cpp159 +++ b/components/service/uefi/smm_variable/backend/test/variable_store_tests.cpp166 #include <service/uefi/smm_variable/backend/uefi_variable_store.h>346 diff --git a/components/service/uefi/smm_variable/backend/uefi_variable_store.c b/components/servic…348 --- a/components/service/uefi/smm_variable/backend/uefi_variable_store.c349 +++ b/components/service/uefi/smm_variable/backend/uefi_variable_store.c[all …]
4 Subject: [PATCH 2/3] Revert "Load and store UEFI variable index in chunks"21 diff --git a/components/service/uefi/smm_variable/backend/test/variable_store_tests.cpp b/component…23 --- a/components/service/uefi/smm_variable/backend/test/variable_store_tests.cpp24 +++ b/components/service/uefi/smm_variable/backend/test/variable_store_tests.cpp144 diff --git a/components/service/uefi/smm_variable/backend/uefi_variable_store.c b/components/servic…146 --- a/components/service/uefi/smm_variable/backend/uefi_variable_store.c147 +++ b/components/service/uefi/smm_variable/backend/uefi_variable_store.c283 + "The UEFI variable index does not fit into the RPC shared memory, please increase " \287 * The SP heap must be large enough for storing the UEFI variable index, the RPC shared memory and
8 # for Trusted Services uefi-test tool if SMM-Gateway is included29 require ${@bb.utils.contains('MACHINE_FEATURES', 'uefi-secureboot', 'linux-yocto-uefi-secureboot.in…