Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 113) sorted by relevance

12345

/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/xml/etree/
DElementPath.py150 signature = []
158 signature.append(token[0] or "-")
160 signature = "".join(signature)
162 if signature == "@-":
170 if signature == "@-='":
179 if signature == "-" and not re.match("\d+$", predicate[0]):
187 if signature == "-='" and not re.match("\d+$", predicate[0]):
198 if signature == "-" or signature == "-()" or signature == "-()-":
200 if signature == "-":
205 if signature == "-()-":
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.10/Lib/xml/etree/
DElementPath.py150 signature = []
158 signature.append(token[0] or "-")
160 signature = "".join(signature)
162 if signature == "@-":
170 if signature == "@-='":
179 if signature == "-" and not re.match("\d+$", predicate[0]):
187 if signature == "-='" and not re.match("\d+$", predicate[0]):
198 if signature == "-" or signature == "-()" or signature == "-()-":
200 if signature == "-":
205 if signature == "-()-":
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeImageVerificationLib/
DDxeImageVerificationLib.inf75 ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature.
76 ## SOMETIMES_PRODUCES ## GUID # Unique ID for the type of the signature.
79 ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature.
80 ## SOMETIMES_PRODUCES ## GUID # Unique ID for the type of the signature.
83 ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature.
84 ## SOMETIMES_PRODUCES ## GUID # Unique ID for the type of the signature.
87 ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature.
88 ## SOMETIMES_PRODUCES ## GUID # Unique ID for the type of the signature.
91 … ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature.
92 …Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature.
[all …]
/device/linaro/bootloader/edk2/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/
DPkcs7VerifyDxe.inf57 …09Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature.
58 …a1Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature.
59 …a256Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature.
60 …a384Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature.
61 …a512Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature.
62 …09Sha256Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature.
63 …09Sha384Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature.
64 …09Sha512Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature.
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/email/test/data/
Dmsg_45.txt9 protocol="application/pgp-signature"; micalg=pgp-sha1
21 Content-Type: application/pgp-signature; name="signature.asc"
22 Content-Description: OpenPGP digital signature
23 Content-Disposition: attachment; filename="signature.asc"
/device/linaro/bootloader/edk2/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/
DSecureBootConfigDxe.inf70 ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature.
71 ## SOMETIMES_PRODUCES ## GUID # Unique ID for the type of the signature.
74 ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature.
75 ## SOMETIMES_PRODUCES ## GUID # Unique ID for the type of the signature.
78 ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature.
79 ## SOMETIMES_PRODUCES ## GUID # Unique ID for the type of the signature.
82 ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature.
83 ## SOMETIMES_PRODUCES ## GUID # Unique ID for the type of the signature.
/device/generic/goldfish/gatekeeper/
DSoftGateKeeper.h81 virtual void ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, in ComputePasswordSignature() argument
84 if (signature == NULL) return; in ComputePasswordSignature()
86 sizeof(salt), N, r, p, signature, signature_length); in ComputePasswordSignature()
94 virtual void ComputeSignature(uint8_t *signature, uint32_t signature_length, in ComputeSignature() argument
96 if (signature == NULL) return; in ComputeSignature()
97 memset(signature, 0, signature_length); in ComputeSignature()
/device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/
DRuntimeCryptLib.uni5 // This library will have external input - signature.
11 // Diffie-Hellman functions, and authenticode signature verification functions are
29signature. This external input must be validated carefully to avoid security issues such as buffer…
DSmmCryptLib.uni5 // This library will have external input - signature.
11 // Diffie-Hellman functions, and authenticode signature verification functions are
29signature. This external input must be validated carefully to avoid security issues such as buffer…
DPeiCryptLib.uni5 // This library will have external input - signature.
12 // signature verification functions, PEM handler functions, and pseudorandom number
30signature. This external input must be validated carefully to avoid security issues such as buffer…
DBaseCryptLib.uni5 // This library will have external input - signature.
24 …dditional review when modified. This library will have external input - signature. This external i…
DSmmCryptLib.inf5 # This library will have external input - signature.
12 # authenticode signature verification functions are not supported in this instance.
/device/generic/goldfish/camera/
DJpegCompressor.cpp33 static void* getSymbol(void* dl, const char* signature) { in getSymbol() argument
34 void* res = dlsym(dl, signature); in getSymbol()
/device/google/dragon/recovery/updater/
Dvboot_interface.c144 res = flash_read(dev, off, &h, sizeof(h.signature)); in fmap_scan_offset()
147 if (!memcmp(&h.signature, FMAP_SIGNATURE, sizeof(h.signature))) in fmap_scan_offset()
168 if (memcmp(&hdr.signature, FMAP_SIGNATURE, sizeof(hdr.signature))) { in fmap_load()
262 if (!gbb || memcmp(hdr->signature, GBB_SIGNATURE, GBB_SIGNATURE_SIZE) || in gbb_get_rootkey()
Dfmap.h41 uint64_t signature; /* "__FMAP__" (0x5F5F50414D465F5F) */ member
/device/generic/goldfish/keymaster/
Dtrusty_keymaster_device.cpp561 const keymaster_blob_t* signature, in finish() argument
583 if (signature && signature->data && signature->data_length > 0) { in finish()
584 request.signature.Reinitialize(signature->data, signature->data_length); in finish()
586 (int)(signature->data_length)); in finish()
745 const keymaster_blob_t* signature, in finish() argument
748 return convert_device(dev)->finish(operation_handle, in_params, input, signature, out_params, in finish()
Dtrusty_keymaster_device.h79 const keymaster_blob_t* input, const keymaster_blob_t* signature,
141 … const keymaster_blob_t* input, const keymaster_blob_t* signature,
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeRsa2048Sha256GuidedSectionExtractLib/
DDxeRsa2048Sha256GuidedSectionExtractLib.uni7 // It uses the BaseCrypyLib based on OpenSSL to authenticate the signature.
23 …on and extracts raw data. It uses the BaseCryptLib based on OpenSSL to authenticate the signature."
/device/linaro/bootloader/edk2/SecurityPkg/Library/PeiRsa2048Sha256GuidedSectionExtractLib/
DPeiRsa2048Sha256GuidedSectionExtractLib.uni7 // It uses the BaseCrypyLib based on OpenSSL to authenticate the signature.
23 …on and extracts raw data. It uses the BaseCryptLib based on OpenSSL to authenticate the signature."
/device/linaro/bootloader/edk2/IntelFspPkg/FspSecCore/Ia32/
DFspApiEntry.asm136 ; Get processor signature and platform ID from the installed processor
138 ; ebx = processor signature
154 ; ebx = processor signature
165 ; Check if signature and plaform ID match
169 jnz load_check ; Jif signature and platform ID match
194 ; Move pointer to first signature structure
198 ; Check if extended signature and platform ID match
202 jnz load_check ; Jif signature and platform ID match
250 rdmsr ; Get current microcode signature
276 rdmsr ; Get current microcode signature
DFspApiEntry.s289 # Get processor signature and platform ID from the installed processor
291 # ebx = processor signature
309 # ebx = processor signature
324 # Check if signature and plaform ID match
329 jnz LoadCheck #Jif signature and platform ID match
363 # Move pointer to first signature structure
369 # Check if extended signature and platform ID match
374 jnz LoadCheck # Jif signature and platform ID match
435 rdmsr # Get current microcode signature
465 rdmsr # Get current microcode signature
/device/linaro/bootloader/edk2/EdkCompatibilityPkg/Foundation/Include/
DEfiDebug.h92 #define CR(record, TYPE, field, signature) \ argument
93 _CR(record, TYPE, field)->Signature != signature ? \
/device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/
DBaseCryptLibRuntimeCryptProtocol.uni9 // authenticode signature verification functions, PEM handler functions,
28 …ie-Hellman functions, X.509 certificate handler functions, authenticode signature verification fun…
/device/linaro/bootloader/edk2/StdLib/Include/Ipf/machine/
Ddig64.h78 char signature[4]; member
/device/linaro/bootloader/arm-trusted-firmware/plat/hikey/
Dpartitions.c50 char signature[8]; member
198 if (strncmp(hd->signature, "EFI PART", 8)) { in get_partition()

12345