Lines Matching full:certificate
109 /// The SHA256 hash of an X.509 certificate's To-Be-Signed contents.
113 /// The time that the certificate shall be considered to be revoked.
120 /// The SHA384 hash of an X.509 certificate's To-Be-Signed contents.
124 /// The time that the certificate shall be considered to be revoked.
131 /// The SHA512 hash of an X.509 certificate's To-Be-Signed contents.
135 /// The time that the certificate shall be considered to be revoked.
194 /// This identifies a signature based on an X.509 certificate. If the signature is an X.509
195 /// certificate then verification of the signature of an image should validate the public
196 /// key certificate in the image using certificate path verification, up to this X.509
197 /// certificate as a trusted root. The SignatureHeader size shall always be 0. The
199 /// the size of the certificate itself.
200 /// Note: This means that each certificate will normally be in a separate EFI_SIGNATURE_LIST.
238 /// This identifies a signature containing the SHA256 hash of an X.509 certificate's
242 /// the certificate should be considered to be revoked from that time and onwards, and
243 /// otherwise the certificate shall be considered to always be revoked.
251 /// This identifies a signature containing the SHA384 hash of an X.509 certificate's
255 /// the certificate should be considered to be revoked from that time and onwards, and
256 /// otherwise the certificate shall be considered to always be revoked.
264 /// This identifies a signature containing the SHA512 hash of an X.509 certificate's
268 /// the certificate should be considered to be revoked from that time and onwards, and
269 /// otherwise the certificate shall be considered to always be revoked.