Searched refs:Chain (Results 1 – 19 of 19) sorted by relevance
19 about the Software Supply Chain of your software image and SDK. The25 assessments, as all the components used in the Software Supply Chain are listed.
492 SGE_CHAIN_UNION Chain; member520 SGE_CHAIN_UNION Chain; member
998 MPI2_SGE_CHAIN_UNION Chain; member1024 MPI2_SGE_CHAIN_UNION Chain; member1183 MPI2_IEEE_SGE_CHAIN_UNION Chain; member
86 net eth1: Chain tail located at descr=2087 net eth1: Chain head is at 20146 net eth1: Chain tail located at descr=255147 net eth1: Chain head is at 255
86 Secure Boot Chain91 Secure Boot Chain process where an already authenticated image verifies178 The remaining components in the Chain of Trust (CoT) are either certificates or bootloader images.
278 4. Chain certificates verification - checking that chained certificates are
224 Depth of the PI Chain414 rtmutex.c. See the 'Chain walk basics and protection scope' comment for further
970 int "GMAC Transmit Clock Delay Chain"973 Set the GMAC Transmit Clock Delay Chain value.
256 the system reset. If the Chain of Trust has a breakage somewhere, the verified
93 6.Chain of Authorship
93 6. Chain of Authorship
106 6. Chain of Authorship
191 DMA Fence Chain
863 tristate "Encrypted Chain IV Generator"866 Encrypted Chain IV generator
226 hc4 d * 7.5 + 4MB Hash Chain with 4 bytes hashing.
181 Chain Mode.
409 See the :wikipedia:`Software Supply Chain <Software_supply_chain>`
602 * Chain of states ``S -> A -> B -> exit`` is verified first.
1050 Chain log vectors and buffers together