Home | History | Annotate | Download | only in DxeImageVerificationLib

Lines Matching refs:Cert

420     // 6.  Since there is no Cert Directory in optional header, hash everything

445 // 7. Hash everything from the end of the checksum to the start of the Cert Directory.
469 // 8. Skip over the Cert Directory. (It is sizeof(IMAGE_DATA_DIRECTORY) bytes.)
470 // 9. Hash everything from the end of the Cert Directory to the end of image header.
988 EFI_SIGNATURE_DATA *Cert;
1021 Cert = (EFI_SIGNATURE_DATA *) ((UINT8 *) CertList + sizeof (EFI_SIGNATURE_LIST) + CertList->SignatureHeaderSize);
1024 if (CompareMem (Cert->SignatureData, Signature, SignatureSize) == 0) {
1029 SecureBootHook (VariableName, &gEfiImageSecurityDatabaseGuid, CertList->SignatureSize, Cert);
1033 Cert = (EFI_SIGNATURE_DATA *) ((UINT8 *) Cert + CertList->SignatureSize);
1130 EFI_SIGNATURE_DATA *Cert;
1145 Cert = NULL;
1177 Cert = (EFI_SIGNATURE_DATA *) ((UINT8 *) CertList + sizeof (EFI_SIGNATURE_LIST) + CertList->SignatureHeaderSize);
1183 RootCert = Cert->SignatureData;
1197 Cert = (EFI_SIGNATURE_DATA *) ((UINT8 *) Cert + CertList->SignatureSize);
1246 UINT8 *Cert;
1258 Cert = NULL;
1354 Cert = (UINT8 *)CertPtr + sizeof (UINT32);
1356 // Advance CertPtr to the next cert in image signer's cert list
1360 if (IsCertHashFoundInDatabase (Cert, CertSize, (EFI_SIGNATURE_LIST *)Data, DataSize, &RevocationTime)) {
1368 // Pass DBT check. Continue to check other certs in image signer's cert list against DBX, DBT
1492 DEBUG ((DEBUG_INFO, "DxeImageVerificationLib: Image is signed and signature is accepted by DB, but its root cert failed the timestamp check.\n"));