Lines Matching +full:boot +full:- +full:reason

1 /*-
37 #include "../libsecureboot-priv.h"
48 * Check if Secure Boot is enabled in firmware.
49 * We evaluate two variables - Secure Boot and Setup Mode.
50 * Secure Boot is enforced only if the first one equals 1 and the other 0.
67 return (-efi_status_to_errno(status)); in efi_secure_boot_enabled()
116 db_size >= list->SignatureListSize && db_size > 0; in efi_get_certs()
117 db_size -= list->SignatureListSize, in efi_get_certs()
119 ((UINT8*)list + list->SignatureListSize)) { in efi_get_certs()
123 &list->SignatureType, in efi_get_certs()
131 list->SignatureHeaderSize); in efi_get_certs()
140 certs[cert_count].data_len = list->SignatureSize - sizeof(EFI_GUID); in efi_get_certs()
146 entry->SignatureData, in efi_get_certs()
166 * UEFI standard specifies three types of digest - sha256, sha386, sha512.
198 db_size >= list->SignatureListSize && db_size > 0; in efi_get_forbidden_digests()
199 db_size -= list->SignatureListSize, in efi_get_forbidden_digests()
201 ((UINT8*)list + list->SignatureListSize)) { in efi_get_forbidden_digests()
204 if (memcmp(&efiCertX509Sha256GUID, &list->SignatureType, in efi_get_forbidden_digests()
207 } else if (memcmp(&efiCertX509Sha384GUID, &list->SignatureType, in efi_get_forbidden_digests()
210 } else if (memcmp(&efiCertX509Sha5122UID, &list->SignatureType, in efi_get_forbidden_digests()
219 * of the same type for some reason. in efi_get_forbidden_digests()
221 header_size = sizeof(EFI_SIGNATURE_LIST) + list->SignatureHeaderSize; in efi_get_forbidden_digests()
224 entry_count = list->SignatureListSize - header_size; in efi_get_forbidden_digests()
225 entry_count /= list->SignatureSize; in efi_get_forbidden_digests()
227 while (entry_count-- > 0) { in efi_get_forbidden_digests()
240 entry->SignatureData, in efi_get_forbidden_digests()
244 entry = (EFI_SIGNATURE_DATA*)(entry + list->SignatureSize); in efi_get_forbidden_digests()
255 while (digest_count--) in efi_get_forbidden_digests()