/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/xml/etree/ |
D | ElementPath.py | 150 signature = [] 158 signature.append(token[0] or "-") 160 signature = "".join(signature) 162 if signature == "@-": 170 if signature == "@-='": 179 if signature == "-" and not re.match("\d+$", predicate[0]): 187 if signature == "-='" and not re.match("\d+$", predicate[0]): 198 if signature == "-" or signature == "-()" or signature == "-()-": 200 if signature == "-": 205 if signature == "-()-":
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.10/Lib/xml/etree/ |
D | ElementPath.py | 150 signature = [] 158 signature.append(token[0] or "-") 160 signature = "".join(signature) 162 if signature == "@-": 170 if signature == "@-='": 179 if signature == "-" and not re.match("\d+$", predicate[0]): 187 if signature == "-='" and not re.match("\d+$", predicate[0]): 198 if signature == "-" or signature == "-()" or signature == "-()-": 200 if signature == "-": 205 if signature == "-()-":
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeImageVerificationLib/ |
D | DxeImageVerificationLib.inf | 75 ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature. 76 ## SOMETIMES_PRODUCES ## GUID # Unique ID for the type of the signature. 79 ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature. 80 ## SOMETIMES_PRODUCES ## GUID # Unique ID for the type of the signature. 83 ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature. 84 ## SOMETIMES_PRODUCES ## GUID # Unique ID for the type of the signature. 87 ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature. 88 ## SOMETIMES_PRODUCES ## GUID # Unique ID for the type of the signature. 91 … ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature. 92 …Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature. [all …]
|
/device/linaro/bootloader/edk2/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/ |
D | Pkcs7VerifyDxe.inf | 57 …09Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature. 58 …a1Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature. 59 …a256Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature. 60 …a384Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature. 61 …a512Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature. 62 …09Sha256Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature. 63 …09Sha384Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature. 64 …09Sha512Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature.
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/email/test/data/ |
D | msg_45.txt | 9 protocol="application/pgp-signature"; micalg=pgp-sha1 21 Content-Type: application/pgp-signature; name="signature.asc" 22 Content-Description: OpenPGP digital signature 23 Content-Disposition: attachment; filename="signature.asc"
|
/device/linaro/bootloader/edk2/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/ |
D | SecureBootConfigDxe.inf | 70 ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature. 71 ## SOMETIMES_PRODUCES ## GUID # Unique ID for the type of the signature. 74 ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature. 75 ## SOMETIMES_PRODUCES ## GUID # Unique ID for the type of the signature. 78 ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature. 79 ## SOMETIMES_PRODUCES ## GUID # Unique ID for the type of the signature. 82 ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the signature. 83 ## SOMETIMES_PRODUCES ## GUID # Unique ID for the type of the signature.
|
/device/generic/goldfish/gatekeeper/ |
D | SoftGateKeeper.h | 81 virtual void ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, in ComputePasswordSignature() argument 84 if (signature == NULL) return; in ComputePasswordSignature() 86 sizeof(salt), N, r, p, signature, signature_length); in ComputePasswordSignature() 94 virtual void ComputeSignature(uint8_t *signature, uint32_t signature_length, in ComputeSignature() argument 96 if (signature == NULL) return; in ComputeSignature() 97 memset(signature, 0, signature_length); in ComputeSignature()
|
/device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/ |
D | RuntimeCryptLib.uni | 5 // This library will have external input - signature. 11 // Diffie-Hellman functions, and authenticode signature verification functions are 29 …signature. This external input must be validated carefully to avoid security issues such as buffer…
|
D | SmmCryptLib.uni | 5 // This library will have external input - signature. 11 // Diffie-Hellman functions, and authenticode signature verification functions are 29 …signature. This external input must be validated carefully to avoid security issues such as buffer…
|
D | PeiCryptLib.uni | 5 // This library will have external input - signature. 12 // signature verification functions, PEM handler functions, and pseudorandom number 30 …signature. This external input must be validated carefully to avoid security issues such as buffer…
|
D | BaseCryptLib.uni | 5 // This library will have external input - signature. 24 …dditional review when modified. This library will have external input - signature. This external i…
|
D | SmmCryptLib.inf | 5 # This library will have external input - signature. 12 # authenticode signature verification functions are not supported in this instance.
|
/device/generic/goldfish/camera/ |
D | JpegCompressor.cpp | 33 static void* getSymbol(void* dl, const char* signature) { in getSymbol() argument 34 void* res = dlsym(dl, signature); in getSymbol()
|
/device/google/dragon/recovery/updater/ |
D | vboot_interface.c | 144 res = flash_read(dev, off, &h, sizeof(h.signature)); in fmap_scan_offset() 147 if (!memcmp(&h.signature, FMAP_SIGNATURE, sizeof(h.signature))) in fmap_scan_offset() 168 if (memcmp(&hdr.signature, FMAP_SIGNATURE, sizeof(hdr.signature))) { in fmap_load() 262 if (!gbb || memcmp(hdr->signature, GBB_SIGNATURE, GBB_SIGNATURE_SIZE) || in gbb_get_rootkey()
|
D | fmap.h | 41 uint64_t signature; /* "__FMAP__" (0x5F5F50414D465F5F) */ member
|
/device/generic/goldfish/keymaster/ |
D | trusty_keymaster_device.cpp | 561 const keymaster_blob_t* signature, in finish() argument 583 if (signature && signature->data && signature->data_length > 0) { in finish() 584 request.signature.Reinitialize(signature->data, signature->data_length); in finish() 586 (int)(signature->data_length)); in finish() 745 const keymaster_blob_t* signature, in finish() argument 748 return convert_device(dev)->finish(operation_handle, in_params, input, signature, out_params, in finish()
|
D | trusty_keymaster_device.h | 79 const keymaster_blob_t* input, const keymaster_blob_t* signature, 141 … const keymaster_blob_t* input, const keymaster_blob_t* signature,
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeRsa2048Sha256GuidedSectionExtractLib/ |
D | DxeRsa2048Sha256GuidedSectionExtractLib.uni | 7 // It uses the BaseCrypyLib based on OpenSSL to authenticate the signature. 23 …on and extracts raw data. It uses the BaseCryptLib based on OpenSSL to authenticate the signature."
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/PeiRsa2048Sha256GuidedSectionExtractLib/ |
D | PeiRsa2048Sha256GuidedSectionExtractLib.uni | 7 // It uses the BaseCrypyLib based on OpenSSL to authenticate the signature. 23 …on and extracts raw data. It uses the BaseCryptLib based on OpenSSL to authenticate the signature."
|
/device/linaro/bootloader/edk2/IntelFspPkg/FspSecCore/Ia32/ |
D | FspApiEntry.asm | 136 ; Get processor signature and platform ID from the installed processor 138 ; ebx = processor signature 154 ; ebx = processor signature 165 ; Check if signature and plaform ID match 169 jnz load_check ; Jif signature and platform ID match 194 ; Move pointer to first signature structure 198 ; Check if extended signature and platform ID match 202 jnz load_check ; Jif signature and platform ID match 250 rdmsr ; Get current microcode signature 276 rdmsr ; Get current microcode signature
|
D | FspApiEntry.s | 289 # Get processor signature and platform ID from the installed processor 291 # ebx = processor signature 309 # ebx = processor signature 324 # Check if signature and plaform ID match 329 jnz LoadCheck #Jif signature and platform ID match 363 # Move pointer to first signature structure 369 # Check if extended signature and platform ID match 374 jnz LoadCheck # Jif signature and platform ID match 435 rdmsr # Get current microcode signature 465 rdmsr # Get current microcode signature
|
/device/linaro/bootloader/edk2/EdkCompatibilityPkg/Foundation/Include/ |
D | EfiDebug.h | 92 #define CR(record, TYPE, field, signature) \ argument 93 _CR(record, TYPE, field)->Signature != signature ? \
|
/device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/ |
D | BaseCryptLibRuntimeCryptProtocol.uni | 9 // authenticode signature verification functions, PEM handler functions, 28 …ie-Hellman functions, X.509 certificate handler functions, authenticode signature verification fun…
|
/device/linaro/bootloader/edk2/StdLib/Include/Ipf/machine/ |
D | dig64.h | 78 char signature[4]; member
|
/device/linaro/bootloader/arm-trusted-firmware/plat/hikey/ |
D | partitions.c | 50 char signature[8]; member 198 if (strncmp(hd->signature, "EFI PART", 8)) { in get_partition()
|