aboutsummaryrefslogtreecommitdiff
path: root/contrib/file/magic/Magdir/efi
diff options
context:
space:
mode:
Diffstat (limited to 'contrib/file/magic/Magdir/efi')
-rw-r--r--contrib/file/magic/Magdir/efi58
1 files changed, 58 insertions, 0 deletions
diff --git a/contrib/file/magic/Magdir/efi b/contrib/file/magic/Magdir/efi
new file mode 100644
index 000000000000..6b40e1519c57
--- /dev/null
+++ b/contrib/file/magic/Magdir/efi
@@ -0,0 +1,58 @@
+
+#------------------------------------------------------------------------------
+# $File: efi,v 1.7 2024/02/18 14:15:22 christos Exp $
+# efi: file(1) magic for Universal EFI binaries
+
+0 lelong 0x0ef1fab9
+>4 lelong 1 Universal EFI binary with 1 architecture
+>>&0 lelong 7 \b, i386
+>>&0 lelong 0x01000007 \b, x86_64
+>4 lelong 2 Universal EFI binary with 2 architectures
+>>&0 lelong 7 \b, i386
+>>&0 lelong 0x01000007 \b, x86_64
+>>&20 lelong 7 \b, i386
+>>&20 lelong 0x01000007 \b, x86_64
+>4 lelong >2 Universal EFI binary with %d architectures
+
+# EFI Signature List
+# From: Alexandre Iooss <erdnaxe@crans.org>
+# URL: https://git.kernel.org/pub/scm/linux/kernel/git/jejb/efitools.git
+0 name efi_sig_list
+>0 guid D719B2CB-3D3A-4596-A3BC-DAD00E67656F EFI Signature List, SIG DB
+>0 guid 4AAFD29D-68DF-49EE-8AA9-347D375665A7 EFI Signature List, PKCS7
+>0 guid 3C5766E8-269C-4E34-AA14-ED776E85B3B6 EFI Signature List, RSA2048
+>0 guid E2B36190-879B-4A3D-AD8D-F2E7BBA32784 EFI Signature List, RSA2048 SHA256
+>0 guid 67F8444F-8743-48F1-A328-1EAAB8736080 EFI Signature List, RSA2048 SHA1
+>0 guid A7717414-C616-4977-9420-844712A735BF EFI Signature List, RSA2048 SHA256 type
+>0 guid 826CA512-CF10-4AC9-B187-BE01496631BD EFI Signature List, SHA1
+>0 guid 0B6E5233-A65C-44C9-9407-D9AB83BFC8BD EFI Signature List, SHA224
+>0 guid C1C41626-504C-4092-ACA9-41F936934328 EFI Signature List, SHA256
+>0 guid FF3E5307-9FD0-48C9-85F1-8AD56C701E01 EFI Signature List, SHA384
+>0 guid 093E0FAE-A6C4-4F50-9F1B-D41E2B89C19A EFI Signature List, SHA512
+>0 guid A5C059A1-94E4-4AA7-87B5-AB155C2BF072 EFI Signature List, X509
+>0 guid 3BD2A492-96C0-4079-B420-FCF98EF103ED EFI Signature List, X509 SHA256
+>0 guid 7076876E-80C2-4EE6-AAD2-28B349A6865B EFI Signature List, X509 SHA384
+>0 guid 446DBF63-2502-4CDA-BCFA-2465D2B0FE9D EFI Signature List, X509 SHA512
+>0 guid 605DAB50-E046-4300-ABB6-3DD810DD8B23 EFI Signature List, MOK_OWNER
+>0 guid A46423E3-4617-49F1-B9FF-D1BFA9115839 EFI Signature List, SECURITY PROTOCOL
+>0 guid 94AB2F58-1438-4EF1-9152-18941A3A0E68 EFI Signature List, SECURITY2 PROTOCOL
+>0 guid AAF32C78-947B-439A-A180-2E144EC37792 EFI Signature List, SECURE VARIABLE
+# Hypothesis: EFI Signature List are smaller than 16MiB
+19 byte =0
+>23 byte =0
+>>27 byte =0
+>>>0 use efi_sig_list
+>>>>16 ulelong x \b, total size: %d bytes
+# Variant: EFI Signature List as an EFI variable
+# See https://docs.kernel.org/filesystems/efivarfs.html
+23 byte =0
+>27 byte =0
+>>31 byte =0
+>>>4 use efi_sig_list
+>>>>0 ulelong x \b, EFI variable %d
+>>>>20 ulelong x \b, total size: %d bytes
+
+# EFI byte code COFF object file
+0 leshort 0x0ebc
+>16 leshort 0
+>>0 use display-coff