| /kernel/linux/linux-4.19/Documentation/device-mapper/ |
| D | verity.txt | 119 Hash blocks are still verified each time they are read from the hash device, 121 blocks, and a hash block will not be verified any more after all the data 122 blocks it covers have been verified anyway. 127 dm-verity is meant to be set up as part of a verified boot path. This 133 After instantiation, all hashes will be verified on-demand during 134 disk access. If they cannot be verified up to the root node of the 144 corrupted data will be verified using the cryptographic hash of the 184 the command-line is verified.
|
| /kernel/linux/linux-5.10/Documentation/admin-guide/device-mapper/ |
| D | verity.rst | 127 Hash blocks are still verified each time they are read from the hash device, 129 blocks, and a hash block will not be verified any more after all the data 130 blocks it covers have been verified anyway. 142 dm-verity is meant to be set up as part of a verified boot path. This 148 After instantiation, all hashes will be verified on-demand during 149 disk access. If they cannot be verified up to the root node of the 159 corrupted data will be verified using the cryptographic hash of the 201 the command-line is verified.
|
| /kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
| D | pkcs7_trust.c | 40 if (x509->verified) in pkcs7_validate_trust_one() 41 goto verified; in pkcs7_validate_trust_one() 124 verified: in pkcs7_validate_trust_one() 126 x509->verified = true; in pkcs7_validate_trust_one() 128 p->verified = true; in pkcs7_validate_trust_one()
|
| D | pkcs7_verify.c | 368 pr_devel("Verified signature %u\n", sinfo->index); in pkcs7_verify_one() 376 * @pkcs7: The PKCS#7 message to be verified 382 * message can be verified. 477 * @data: The data to be verified
|
| /kernel/linux/linux-4.19/crypto/asymmetric_keys/ |
| D | pkcs7_trust.c | 44 if (x509->verified) in pkcs7_validate_trust_one() 45 goto verified; in pkcs7_validate_trust_one() 128 verified: in pkcs7_validate_trust_one() 130 x509->verified = true; in pkcs7_validate_trust_one() 132 p->verified = true; in pkcs7_validate_trust_one()
|
| D | pkcs7_verify.c | 340 pr_devel("Verified signature %u\n", sinfo->index); in pkcs7_verify_one() 348 * @pkcs7: The PKCS#7 message to be verified 354 * message can be verified. 449 * @data: The data to be verified
|
| /kernel/linux/linux-4.19/security/integrity/ima/ |
| D | Kconfig | 191 be signed and verified by a public key on the trusted IMA 194 Kernel image signatures can not be verified by the original 204 and verified by a public key on the trusted IMA keyring. 206 Kernel module signatures can only be verified by IMA-appraisal, 216 and verified by a key on the trusted IMA keyring.
|
| /kernel/linux/linux-5.10/security/integrity/ima/ |
| D | Kconfig | 205 be signed and verified by a public key on the trusted IMA 208 Kernel image signatures can not be verified by the original 218 and verified by a public key on the trusted IMA keyring. 220 Kernel module signatures can only be verified by IMA-appraisal, 230 and verified by a key on the trusted IMA keyring.
|
| /kernel/linux/linux-5.10/fs/verity/ |
| D | verify.c | 20 * @dindex: (in) the index of the data block being verified 74 * only ascend the tree until an already-verified page is seen, as indicated by 108 * the way until we find a verified hash page, indicated by PageChecked; in verify_page() 164 pr_debug("Verified hash page at level %d, now want %s:%*phN\n", in verify_page() 282 * Use an unbound workqueue to allow bios to be verified in parallel in fsverity_init_workqueue()
|
| /kernel/linux/linux-5.10/drivers/mtd/tests/ |
| D | subpagetest.c | 258 pr_info("verified up to eraseblock %u\n", i); in verify_all_eraseblocks_ff() 264 pr_info("verified %u eraseblocks\n", i); in verify_all_eraseblocks_ff() 355 pr_info("verified up to eraseblock %u\n", i); in mtd_subpagetest_init() 361 pr_info("verified %u eraseblocks\n", i); in mtd_subpagetest_init() 399 pr_info("verified up to eraseblock %u\n", i); in mtd_subpagetest_init() 405 pr_info("verified %u eraseblocks\n", i); in mtd_subpagetest_init()
|
| D | oobtest.c | 326 pr_info("verified up to eraseblock %u\n", i); in verify_all_eraseblocks() 332 pr_info("verified %u eraseblocks\n", i); in verify_all_eraseblocks() 440 pr_info("verified up to eraseblock %u\n", i); in mtd_oobtest_init() 446 pr_info("verified %u eraseblocks\n", i); in mtd_oobtest_init() 709 pr_info("verified up to eraseblock %u\n", i); in mtd_oobtest_init() 715 pr_info("verified %u eraseblocks\n", i); in mtd_oobtest_init()
|
| /kernel/linux/linux-4.19/Documentation/sysctl/ |
| D | user.txt | 21 verified to be below the per user limit in that user namespace. 25 in (user namespaces can be nested) and verified to be below the per user
|
| /kernel/linux/linux-4.19/drivers/mtd/tests/ |
| D | subpagetest.c | 271 pr_info("verified up to eraseblock %u\n", i); in verify_all_eraseblocks_ff() 277 pr_info("verified %u eraseblocks\n", i); in verify_all_eraseblocks_ff() 368 pr_info("verified up to eraseblock %u\n", i); in mtd_subpagetest_init() 374 pr_info("verified %u eraseblocks\n", i); in mtd_subpagetest_init() 412 pr_info("verified up to eraseblock %u\n", i); in mtd_subpagetest_init() 418 pr_info("verified %u eraseblocks\n", i); in mtd_subpagetest_init()
|
| D | oobtest.c | 338 pr_info("verified up to eraseblock %u\n", i); in verify_all_eraseblocks() 344 pr_info("verified %u eraseblocks\n", i); in verify_all_eraseblocks() 452 pr_info("verified up to eraseblock %u\n", i); in mtd_oobtest_init() 458 pr_info("verified %u eraseblocks\n", i); in mtd_oobtest_init() 721 pr_info("verified up to eraseblock %u\n", i); in mtd_oobtest_init() 727 pr_info("verified %u eraseblocks\n", i); in mtd_oobtest_init()
|
| /kernel/linux/linux-5.10/drivers/clk/sunxi-ng/ |
| D | ccu-sun50i-h6-r.c | 80 * of the hardware block is verified with "3.1 Memory Mapping" chapter in 81 * "Allwinner H6 V200 User Manual V1.1"; and the parent APB buses are verified 112 * this mod clock is proven by BSP clock header, and the dividers are verified
|
| /kernel/linux/linux-4.19/drivers/clk/sunxi-ng/ |
| D | ccu-sun50i-h6-r.c | 90 * of the hardware block is verified with "3.1 Memory Mapping" chapter in 91 * "Allwinner H6 V200 User Manual V1.1"; and the parent APB buses are verified 122 * this mod clock is proven by BSP clock header, and the dividers are verified
|
| /kernel/linux/linux-5.10/drivers/md/ |
| D | dm-verity-verify-sig.c | 100 * @root_hash: For verity, the roothash/data to be verified. 101 * @root_hash_len: Size of the roothash/data to be verified.
|
| /kernel/linux/linux-5.10/Documentation/admin-guide/sysctl/ |
| D | user.rst | 26 verified to be below the per user limit in that user namespace. 30 in (user namespaces can be nested) and verified to be below the per user
|
| /kernel/linux/linux-4.19/drivers/gpu/drm/i915/ |
| D | intel_huc.c | 88 DRM_ERROR("HuC: Firmware not verified %#x\n", status); in intel_huc_auth() 111 * Returns positive value if HuC firmware is loaded and verified
|
| /kernel/linux/linux-5.10/Documentation/ABI/testing/ |
| D | sysfs-class-chromeos-driver-cros-ec-vbc | 5 Read/write the verified boot context data included on a
|
| /kernel/linux/linux-5.10/tools/testing/selftests/bpf/verifier/ |
| D | search_pruning.c | 85 "search pruning: all branches should be verified (nop operation)", 112 "search pruning: all branches should be verified (invalid stack access)",
|
| /kernel/linux/linux-4.19/drivers/staging/comedi/drivers/ |
| D | ni_mio_cs.c | 58 .caldac = { mb88341 }, /* verified */ 72 .caldac = { ad8804_debug }, /* verified */
|
| /kernel/linux/linux-5.10/drivers/staging/comedi/drivers/ |
| D | ni_mio_cs.c | 58 .caldac = { mb88341 }, /* verified */ 72 .caldac = { ad8804_debug }, /* verified */
|
| /kernel/linux/linux-4.19/Documentation/admin-guide/LSM/ |
| D | LoadPin.rst | 8 such as dm-verity or CDROM. This allows systems that have a verified
|
| /kernel/linux/linux-5.10/Documentation/filesystems/ |
| D | fsverity.rst | 26 automatically verified against the file's Merkle tree. Reads of any 423 fs-verity. In this case, the plaintext data is verified rather than 470 fs-verity ensures that all reads of a verity file's data are verified, 474 already verified). Below, we describe how filesystems implement this. 504 an already-verified hash page is seen, as indicated by the PageChecked 524 encrypted, the pages must be decrypted before being verified. To 707 Uptodate until they've been verified. Currently, each
|