Home | History | Annotate | Download | only in AuthVariableLib

Lines Matching refs:Cert

522   // Cert type should be EFI_CERT_TYPE_RSA2048_SHA256_GUID.

963 Cert in PK database.
1054 // Time-based, verify against X509 Cert KEK.
1394 EFI_SIGNATURE_DATA *Cert;
1436 Cert = (EFI_SIGNATURE_DATA *) ((UINT8 *) CertList + sizeof (EFI_SIGNATURE_LIST) + CertList->SignatureHeaderSize);
1442 if (CompareMem (NewCert, Cert, CertList->SignatureSize) == 0) {
1446 Cert = (EFI_SIGNATURE_DATA *) ((UINT8 *) Cert + CertList->SignatureSize);
1810 // Get corresponding cert node from "certdb" or "certdbv".
1945 // Find whether matching cert node already exists in "certdb" or "certdbv".
1984 // Construct new cert node.
2110 DEBUG((EFI_D_INFO, "Recovery!! Cert for Auth Variable %s Guid %g is removed for consistency\n", VariableName, &AuthVarGuid));
2174 EFI_SIGNATURE_DATA *Cert;
2230 // Cert type should be EFI_CERT_TYPE_PKCS7_GUID.
2325 Cert = (EFI_SIGNATURE_DATA *) ((UINT8 *) CertList + sizeof (EFI_SIGNATURE_LIST) + CertList->SignatureHeaderSize);
2327 (CompareMem (Cert->SignatureData, RootCert, RootCertSize) != 0)) {
2366 Cert = (EFI_SIGNATURE_DATA *) ((UINT8 *) CertList + sizeof (EFI_SIGNATURE_LIST) + CertList->SignatureHeaderSize);
2372 RootCert = Cert->SignatureData;
2389 Cert = (EFI_SIGNATURE_DATA *) ((UINT8 *) Cert + CertList->SignatureSize);
2456 Cert = (EFI_SIGNATURE_DATA *) ((UINT8 *) CertList + sizeof (EFI_SIGNATURE_LIST) + CertList->SignatureHeaderSize);
2457 RootCert = Cert->SignatureData;