/device/generic/goldfish/gatekeeper/ |
D | module.cpp | 58 static int verify(const struct gatekeeper_device *dev __unused, uint32_t uid, uint64_t challenge, in verify() function 65 return s_gatekeeper->verify(uid, challenge, in verify() 101 s_device.device.verify = verify; in goldfish_gatekeeper_open()
|
D | SoftGateKeeperDevice.h | 66 int verify(uint32_t uid, uint64_t challenge,
|
D | SoftGateKeeperDevice.cpp | 76 int SoftGateKeeperDevice::verify(uint32_t uid, in verify() function in goldfish::SoftGateKeeperDevice
|
/device/google/cuttlefish_common/guest/hals/gatekeeper/ |
D | module.cpp | 58 static int verify(const struct gatekeeper_device *dev __unused, uint32_t uid, uint64_t challenge, in verify() function 65 return s_gatekeeper->verify(uid, challenge, in verify() 101 s_device.device.verify = verify; in cuttlefish_gatekeeper_open()
|
D | SoftGateKeeperDevice.h | 66 int verify(uint32_t uid, uint64_t challenge,
|
D | SoftGateKeeperDevice.cpp | 76 int SoftGateKeeperDevice::verify(uint32_t uid, in verify() function in cuttlefish::SoftGateKeeperDevice
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/FmpAuthenticationLibRsa2048Sha256/ |
D | FmpAuthenticationLibRsa2048Sha256.uni | 4 // This library provide FMP Authentication RSA2048SHA256 handler to verify EFI_FIRMWARE_IMAGE_AUTHE… 25 … en-US "This library provide FMP Authentication RSA2048SHA256 handler to verify EFI_FIRMWARE_IMAGE…
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/FmpAuthenticationLibPkcs7/ |
D | FmpAuthenticationLibPkcs7.uni | 4 // This library provide FMP Authentication PKCS7 handler to verify EFI_FIRMWARE_IMAGE_AUTHENTICATIO… 25 …language en-US "This library provide FMP Authentication PKCS7 handler to verify EFI_FIRMWARE_IMAGE…
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeImageVerificationLib/ |
D | DxeImageVerificationLib.uni | 4 // This library hooks LoadImage() API to verify every image by the verification policy. 25 …CRIPTION #language en-US "This library hooks LoadImage() API to verify every image by the…
|
D | DxeImageVerificationLib.inf | 4 # This library hooks LoadImage() API to verify every image by the verification policy.
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/PlatformSecureLibNull/ |
D | PlatformSecureLibNull.uni | 5 // user exists but returns TRUE directly. This instance can be used to verify security 23 …sent user exists but returns TRUE directly. This instance can be used to verify security related f…
|
D | PlatformSecureLibNull.inf | 5 # user exists but returns TRUE directly. This instance can be used to verify security
|
/device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/ |
D | BaseCryptLibRuntimeCryptProtocol.uni | 7 // AES/TDES/ARC4 functions, RSA external functions, PKCS#7 SignedData sign/verify 28 … AES/TDES/ARC4 functions, RSA external functions, PKCS#7 SignedData sign/verify functions, Diffie-…
|
D | BaseCryptLibRuntimeCryptProtocol.inf | 6 # AES/TDES/ARC4 functions, RSA external functions, PKCS#7 SignedData sign/verify
|
/device/google/contexthub/util/nanoapp_sign/ |
D | nanoapp_sign.c | 434 bool verify = false; in main() local 454 verify = true; in main() 486 if (verify) in main() 499 if (verify && (!keyPubFile || keyPvtFile)) in main() 543 else if (verify) in main()
|
/device/google/marlin/ |
D | charger.fstab.qcom | 9 …system /system ext4 ro,barrier=1,discard wait,verify
|
D | fstab.common | 9 …c/by-name/system / ext4 ro,barrier=1 wait,slotselect,verify
|
/device/linaro/bootloader/arm-trusted-firmware/docs/ |
D | auth-framework.rst | 14 terms of certificate hierarchy and the mechanisms used to verify a 23 - The mechanism used to verify the transported information i.e. the 74 behind them. These aspects are key to verify a Chain of Trust. 139 performed to verify it: 188 #. Export functions to verify an image which uses an authentication method that 210 Key Certificate in the TBBR-Client spec. contains information to verify 215 #. Reusing memory meant for a data image to verify authentication images e.g. 221 never exceed the size of a data image. It should be possible to verify this 358 verified. Each image has a set of properties which allow the AM to verify it. 437 be used to verify either the current or the next image in the CoT sequence. [all …]
|
/device/google/contexthub/util/nanoapp_encr/ |
D | nanoapp_encr.c | 224 bool verify = memcmp(fileHash, calcHash, SHA2_HASH_SIZE) == 0; in handleDecrypt() local 225 fprintf(stderr, "hash verification: %s\n", verify ? "passed" : "failed"); in handleDecrypt() 226 if (!verify) in handleDecrypt()
|
/device/linaro/bootloader/edk2/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/ |
D | Pkcs7VerifyDxe.uni | 6 // Verification Protocol which is used to verify data signed using PKCS#7
|
D | Pkcs7VerifyDxe.inf | 6 # UEFI PKCS7 Verification Protocol which is used to verify data signed using PKCS7
|
/device/linaro/bootloader/edk2/OvmfPkg/SmmAccess/ |
D | SmmAccessPei.inf | 5 # - verify & configure the Q35 TSEG in the entry point,
|
/device/linaro/hikey/uefi-tools/ |
D | uefi-build.sh | 375 if test -d .git && head=`git rev-parse --verify --short HEAD 2>/dev/null`; then
|
D | edk2-build.sh | 384 if test -d .git && head=`git rev-parse --verify --short HEAD 2>/dev/null`; then
|
/device/linaro/bootloader/edk2/SecurityPkg/ |
D | SecurityPkg.uni | 180 …ge en-US "One or more SHA 256 Hashes of RSA 2048 bit public keys used to verify Recovery and Capsu… 182 …"Provides one or more SHA 256 Hashes of the RSA 2048 public keys used to verify Recovery and Capsu… 219 …eGuid_PcdPkcs7CertBuffer_PROMPT #language en-US "One PKCS7 cert used to verify Recovery and Capsu… 221 …cdPkcs7CertBuffer_HELP #language en-US "Provides one PKCS7 cert used to verify Recovery and Capsu…
|