Searched refs:HashSize (Results 1 - 10 of 10) sorted by relevance

/vbox/src/VBox/Devices/EFI/Firmware/CryptoPkg/Library/BaseCryptLib/Pk/
H A DCryptAuthenticode.c38 @param[in] HashSize Size of Image hash value in bytes.
52 IN UINTN HashSize
69 if ((DataSize > INT_MAX) || (CertSize > INT_MAX) || (HashSize > INT_MAX)) {
132 if (CompareMem (SpcIndirectDataContent + ContentSize - HashSize, ImageHash, HashSize) != 0) {
H A DCryptRsa.c567 If HashSize is not equal to the size of MD5, SHA-1 or SHA-256 digest, then return FALSE.
572 @param[in] HashSize Size of the message hash in bytes.
587 IN UINTN HashSize,
600 (HashSize != MD5_DIGEST_SIZE && HashSize != SHA1_DIGEST_SIZE && HashSize != SHA256_DIGEST_SIZE)) {
616 Size = DigestInfoEncoding (MessageHash, HashSize, Signature);
641 If HashSize is not equal to the size of MD5, SHA-1 or SHA-256 digest, then return FALSE.
645 @param[in] HashSize Size of the message hash in bytes.
658 IN UINTN HashSize,
584 RsaPkcs1Sign( IN VOID *RsaContext, IN CONST UINT8 *MessageHash, IN UINTN HashSize, OUT UINT8 *Signature, IN OUT UINTN *SigSize ) argument
655 RsaPkcs1Verify( IN VOID *RsaContext, IN CONST UINT8 *MessageHash, IN UINTN HashSize, IN UINT8 *Signature, IN UINTN SigSize ) argument
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/SecurityPkg/Library/DxeTpmMeasureBootLib/
H A DDxeTpmMeasureBootLib.c284 UINTN HashSize; local
397 HashSize = (UINTN) ((UINT8 *)(&Hdr.Pe32->OptionalHeader.CheckSum) - HashBase);
403 HashSize = (UINTN) ((UINT8 *)(&Hdr.Pe32Plus->OptionalHeader.CheckSum) - HashBase);
406 HashStatus = Sha1Update (Sha1Ctx, HashBase, HashSize);
424 HashSize = Hdr.Pe32->OptionalHeader.SizeOfHeaders - (UINTN) (HashBase - ImageAddress);
430 HashSize = Hdr.Pe32Plus->OptionalHeader.SizeOfHeaders - (UINTN) (HashBase - ImageAddress);
433 if (HashSize != 0) {
434 HashStatus = Sha1Update (Sha1Ctx, HashBase, HashSize);
448 HashSize = (UINTN) ((UINT8 *)(&Hdr.Pe32->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY]) - HashBase);
454 HashSize
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/SecurityPkg/Library/DxeImageVerificationLib/
H A DDxeImageVerificationLib.c249 UINTN HashSize; local
310 HashSize = (UINTN) ((UINT8 *) (&mNtHeader.Pe32->OptionalHeader.CheckSum) - HashBase);
316 HashSize = (UINTN) ((UINT8 *) (&mNtHeader.Pe32Plus->OptionalHeader.CheckSum) - HashBase);
326 Status = mHash[HashAlg].HashUpdate(HashCtx, HashBase, HashSize);
344 HashSize = mNtHeader.Pe32->OptionalHeader.SizeOfHeaders - (UINTN) (HashBase - mImageBase);
350 HashSize = mNtHeader.Pe32Plus->OptionalHeader.SizeOfHeaders - (UINTN) (HashBase - mImageBase);
353 if (HashSize != 0) {
354 Status = mHash[HashAlg].HashUpdate(HashCtx, HashBase, HashSize);
368 HashSize = (UINTN) ((UINT8 *) (&mNtHeader.Pe32->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY]) - HashBase);
374 HashSize
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/CryptoPkg/Application/Cryptest/
H A DRsaVerify.c96 UINTN HashSize; local
305 HashSize = SHA1_DIGEST_SIZE;
306 ZeroMem (HashValue, HashSize);
362 Status = RsaPkcs1Sign (Rsa, HashValue, HashSize, NULL, &SigSize);
369 Status = RsaPkcs1Sign (Rsa, HashValue, HashSize, Signature, &SigSize);
391 Status = RsaPkcs1Verify (Rsa, HashValue, HashSize, Signature, SigSize);
/vbox/src/VBox/Devices/EFI/Firmware/MdePkg/Include/Protocol/
H A DHash.h85 @param[out] HashSize Holds the returned size of the algorithm's hash.
88 @retval EFI_INVALID_PARAMETER HashSize is NULL
98 OUT UINTN *HashSize
/vbox/src/VBox/Devices/EFI/Firmware/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/
H A DSecureBootConfigImpl.c976 UINTN HashSize; local
1029 HashSize = (UINTN) ((UINT8 *) (&mNtHeader.Pe32->OptionalHeader.CheckSum) - HashBase);
1034 HashSize = (UINTN) ((UINT8 *) (&mNtHeader.Pe32Plus->OptionalHeader.CheckSum) - HashBase);
1037 Status = mHash[HashAlg].HashUpdate(HashCtx, HashBase, HashSize);
1051 HashSize = (UINTN) ((UINT8 *) (&mNtHeader.Pe32->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY]) - HashBase);
1057 HashSize = (UINTN) ((UINT8 *) (&mNtHeader.Pe32Plus->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY]) - HashBase);
1060 Status = mHash[HashAlg].HashUpdate(HashCtx, HashBase, HashSize);
1073 HashSize = mNtHeader.Pe32->OptionalHeader.SizeOfHeaders - (UINTN) ((UINT8 *) (&mNtHeader.Pe32->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY + 1]) - mImageBase);
1079 HashSize = mNtHeader.Pe32Plus->OptionalHeader.SizeOfHeaders - (UINTN) ((UINT8 *) (&mNtHeader.Pe32Plus->OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_SECURITY + 1]) - mImageBase);
1082 Status = mHash[HashAlg].HashUpdate(HashCtx, HashBase, HashSize);
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/CryptoPkg/Include/Library/
H A DBaseCryptLib.h1349 If HashSize is not equal to the size of MD5, SHA-1 or SHA-256 digest, then return FALSE.
1354 @param[in] HashSize Size of the message hash in bytes.
1369 IN UINTN HashSize,
1381 If HashSize is not equal to the size of MD5, SHA-1, SHA-256 digest, then return FALSE.
1385 @param[in] HashSize Size of the message hash in bytes.
1398 IN UINTN HashSize,
1705 @param[in] HashSize Size of Image hash value in bytes.
1719 IN UINTN HashSize
/vbox/src/VBox/Devices/EFI/Firmware/SecurityPkg/UserIdentification/PwdCredentialProviderDxe/
H A DPwdCredentialProvider.c282 UINTN HashSize; local
285 HashSize = Sha1GetContextSize ();
286 Hash = AllocatePool (HashSize);
/vbox/src/VBox/Devices/EFI/Firmware/SecurityPkg/UserIdentification/UsbCredentialProviderDxe/
H A DUsbCredentialProvider.c435 UINTN HashSize; local
438 HashSize = Sha1GetContextSize ();
439 Hash = AllocatePool (HashSize);

Completed in 62 milliseconds