Searched defs:Cert (Results 1 - 6 of 6) sorted by relevance
| /vbox/src/VBox/Devices/EFI/Firmware/CryptoPkg/Library/BaseCryptLib/Pk/ |
| H A D | CryptX509.c | 22 If Cert is NULL, then return FALSE. 25 @param[in] Cert Pointer to the DER-encoded certificate data. 36 IN CONST UINT8 *Cert, 48 if (Cert == NULL || SingleX509Cert == NULL || CertSize > INT_MAX) { 58 BIO_write (CertBio, Cert, (int) CertSize); 102 UINT8 *Cert; local 134 // If Cert is NULL, then it is the end of the list. 136 Cert = VA_ARG (Args, UINT8 *); 137 if (Cert == NULL) { 147 (CONST UINT8 *) Cert, 35 X509ConstructCertificate( IN CONST UINT8 *Cert, IN UINTN CertSize, OUT UINT8 **SingleX509Cert ) argument 241 X509PopCertificate( IN VOID *X509Stack, OUT UINT8 **Cert, OUT UINTN *CertSize ) argument 331 X509GetSubjectName( IN CONST UINT8 *Cert, IN UINTN CertSize, OUT UINT8 *CertSubject, IN OUT UINTN *SubjectSize ) argument 401 RsaGetPublicKeyFromX509( IN CONST UINT8 *Cert, IN UINTN CertSize, OUT VOID **RsaContext ) argument 473 X509VerifyCert( IN CONST UINT8 *Cert, IN UINTN CertSize, IN CONST UINT8 *CACert, IN UINTN CACertSize ) argument [all...] |
| H A D | CryptPkcs7.c | 619 X509 *Cert; local 637 Cert = NULL; 681 Cert = d2i_X509_bio (CertBio, NULL); 682 if (Cert == NULL) { 693 if (!(X509_STORE_add_cert (CertStore, Cert))) { 721 X509_free (Cert);
|
| /vbox/src/VBox/Devices/EFI/Firmware/SecurityPkg/Library/DxeImageVerificationLib/ |
| H A D | DxeImageVerificationLib.c | 336 // 6. Since there is no Cert Directory in optional header, hash everything 361 // 7. Hash everything from the end of the checksum to the start of the Cert Directory. 385 // 8. Skip over the Cert Directory. (It is sizeof(IMAGE_DATA_DIRECTORY) bytes.) 386 // 9. Hash everything from the end of the Cert Directory to the end of image header. 816 EFI_SIGNATURE_DATA *Cert; local 848 Cert = (EFI_SIGNATURE_DATA *) ((UINT8 *) CertList + sizeof (EFI_SIGNATURE_LIST) + CertList->SignatureHeaderSize); 851 if (CompareMem (Cert->SignatureData, Signature, SignatureSize) == 0) { 859 Cert = (EFI_SIGNATURE_DATA *) ((UINT8 *) Cert + CertList->SignatureSize); 900 EFI_SIGNATURE_DATA *Cert; local [all...] |
| /vbox/src/VBox/Devices/EFI/Firmware/SecurityPkg/VariableAuthenticated/RuntimeDxe/ |
| H A D | AuthService.c | 540 // Cert type should be EFI_CERT_TYPE_RSA2048_SHA256_GUID. 897 // Verify against X509 Cert PK. 1004 // Time-based, verify against X509 Cert KEK. 1224 EFI_SIGNATURE_DATA *Cert; local 1253 Cert = (EFI_SIGNATURE_DATA *) ((UINT8 *) CertList + sizeof (EFI_SIGNATURE_LIST) + CertList->SignatureHeaderSize); 1259 if (CompareMem (NewCert, Cert, CertList->SignatureSize) == 0) { 1263 Cert = (EFI_SIGNATURE_DATA *) ((UINT8 *) Cert + CertList->SignatureSize); 1852 EFI_SIGNATURE_DATA *Cert; local 1907 // Cert typ [all...] |
| /vbox/src/VBox/Devices/EFI/Firmware/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/ |
| H A D | SecureBootConfigImpl.c | 1043 // 6. Get the address of the beginning of the Cert Directory. 1044 // 7. Hash everything from the end of the checksum to the start of the Cert Directory. 1065 // 8. Skip over the Cert Directory. (It is sizeof(IMAGE_DATA_DIRECTORY) bytes.) 1066 // 9. Hash everything from the end of the Cert Directory to the end of image header. 1518 EFI_SIGNATURE_DATA *Cert; local 1526 Cert = NULL; 1619 Cert = (EFI_SIGNATURE_DATA *) ((UINT8 *) CertList 1626 GuidToString (&Cert->SignatureOwner, GuidStr, 100); 1697 EFI_SIGNATURE_DATA *Cert; local 1708 Cert 1886 EFI_SIGNATURE_DATA *Cert; local [all...] |
| /vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/IpSecDxe/Ikev2/ |
| H A D | Payload.c | 1441 IKEV2_CERT *Cert; local 1456 // ! Cert Encoding ! ! 1476 Cert = AllocateZeroPool (PayloadLen); 1477 if (Cert == NULL) { 1484 Cert->Header.NextPayload = NextPayload; 1485 Cert->Header.PayloadLength = PayloadLen; 1486 Cert->CertEncoding = EncodeType; 1489 ((UINT8 *)Cert) + sizeof (IKEV2_CERT), 1524 ((UINT8 *)Cert) + sizeof (IKEV2_CERT), 1541 CertPayload->PayloadBuf = (UINT8 *) Cert; [all...] |
Completed in 91 milliseconds