Searched refs:EFI_SIGNATURE_LIST (Results 1 - 5 of 5) sorted by relevance

/vbox/src/VBox/Devices/EFI/Firmware/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/
H A DSecureBootConfigImpl.c260 OUT EFI_SIGNATURE_LIST **PkCert
282 *PkCert = (EFI_SIGNATURE_LIST*) AllocateZeroPool (
283 sizeof(EFI_SIGNATURE_LIST) + sizeof(EFI_SIGNATURE_DATA) - 1
291 (*PkCert)->SignatureListSize = (UINT32) (sizeof(EFI_SIGNATURE_LIST)
298 + sizeof(EFI_SIGNATURE_LIST)
340 EFI_SIGNATURE_LIST *PkCert;
452 EFI_SIGNATURE_LIST *KekSigList;
472 // Form the KeKpub certificate list into EFI_SIGNATURE_LIST type.
510 // Form an new EFI_SIGNATURE_LIST.
512 KekSigListSize = sizeof(EFI_SIGNATURE_LIST)
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/SecurityPkg/VariableAuthenticated/RuntimeDxe/
H A DAuthService.c759 Check input data form to make sure it is a valid EFI_SIGNATURE_LIST for PK/KEK variable.
778 EFI_SIGNATURE_LIST *SigList;
799 SigList = (EFI_SIGNATURE_LIST *) Data;
832 if ((SigList->SignatureListSize - sizeof (EFI_SIGNATURE_LIST) - SigList->SignatureHeaderSize) % SigList->SignatureSize != 0) {
835 SigCount += (SigList->SignatureListSize - sizeof (EFI_SIGNATURE_LIST) - SigList->SignatureHeaderSize) / SigList->SignatureSize;
838 SigList = (EFI_SIGNATURE_LIST *) ((UINT8 *) SigList + SigList->SignatureListSize);
1203 Merge two buffers which formatted as EFI_SIGNATURE_LIST. Only the new EFI_SIGNATURE_DATA
1204 will be appended to the original EFI_SIGNATURE_LIST, duplicate EFI_SIGNATURE_DATA
1207 @param[in, out] Data Pointer to original EFI_SIGNATURE_LIST.
1209 @param[in] NewData Pointer to new EFI_SIGNATURE_LIST t
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/MdePkg/Include/Guid/
H A DImageAuthentication.h112 } EFI_SIGNATURE_LIST; typedef in typeref:struct:__anon11349
174 /// Note: This means that each certificate will normally be in a separate EFI_SIGNATURE_LIST.
268 EFI_SIGNATURE_LIST Signature;
/vbox/src/VBox/Devices/EFI/Firmware/SecurityPkg/Library/DxeImageVerificationLib/
H A DDxeImageVerificationLib.c642 @param[in] Signature Input signature info in EFI_SIGNATURE_LIST data structure.
651 IN EFI_SIGNATURE_LIST *Signature OPTIONAL,
815 EFI_SIGNATURE_LIST *CertList;
845 CertList = (EFI_SIGNATURE_LIST *) Data;
848 Cert = (EFI_SIGNATURE_DATA *) ((UINT8 *) CertList + sizeof (EFI_SIGNATURE_LIST) + CertList->SignatureHeaderSize);
868 CertList = (EFI_SIGNATURE_LIST *) ((UINT8 *) CertList + CertList->SignatureListSize);
881 as EFI_SIGNATURE_LIST. The Variable may be PK, KEK, DB or DBX.
899 EFI_SIGNATURE_LIST *CertList;
932 CertList = (EFI_SIGNATURE_LIST *) Data;
935 Cert = (EFI_SIGNATURE_DATA *) ((UINT8 *) CertList + sizeof (EFI_SIGNATURE_LIST)
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/
H A DAuthService.c480 EFI_SIGNATURE_LIST *OldPkList;
543 OldPkList = (EFI_SIGNATURE_LIST *) Global->KeyList;
544 OldPkData = (EFI_SIGNATURE_DATA *) ((UINT8 *) OldPkList + sizeof (EFI_SIGNATURE_LIST) + OldPkList->SignatureHeaderSize);
615 EFI_SIGNATURE_LIST *KekList;
678 KekList = (EFI_SIGNATURE_LIST *) Global->KeyList;
680 KekCount = (KekList->SignatureListSize - sizeof (EFI_SIGNATURE_LIST) - KekList->SignatureHeaderSize) / KekList->SignatureSize;
681 KekItem = (EFI_SIGNATURE_DATA *) ((UINT8 *) KekList + sizeof (EFI_SIGNATURE_LIST) + KekList->SignatureHeaderSize);

Completed in 2048 milliseconds