| /kernel/linux/linux-6.6/fs/verity/ |
| D | verify.c | 17 * @hpage, has already been verified. 22 bool verified; in is_hash_block_verified() local 29 * to directly indicate whether the page's block has been verified. in is_hash_block_verified() 40 * to indicate whether each hash block has been verified. in is_hash_block_verified() 43 * re-instantiated from the backing storage are re-verified. To do in is_hash_block_verified() 63 verified = test_bit(hblock_idx, vi->hash_block_verified); in is_hash_block_verified() 75 verified = false; in is_hash_block_verified() 78 return verified; in is_hash_block_verified() 86 * only ascend the tree until an already-verified hash block is seen, and then 147 * the way until we find a hash block that has already been verified, or in verify_data_block() [all …]
|
| /kernel/linux/linux-5.10/Documentation/admin-guide/device-mapper/ |
| D | verity.rst | 127 Hash blocks are still verified each time they are read from the hash device, 129 blocks, and a hash block will not be verified any more after all the data 130 blocks it covers have been verified anyway. 142 dm-verity is meant to be set up as part of a verified boot path. This 148 After instantiation, all hashes will be verified on-demand during 149 disk access. If they cannot be verified up to the root node of the 159 corrupted data will be verified using the cryptographic hash of the 201 the command-line is verified.
|
| /kernel/linux/linux-6.6/Documentation/admin-guide/device-mapper/ |
| D | verity.rst | 127 Hash blocks are still verified each time they are read from the hash device, 129 blocks, and a hash block will not be verified any more after all the data 130 blocks it covers have been verified anyway. 151 dm-verity is meant to be set up as part of a verified boot path. This 157 After instantiation, all hashes will be verified on-demand during 158 disk access. If they cannot be verified up to the root node of the 168 corrupted data will be verified using the cryptographic hash of the 210 the command-line is verified.
|
| /kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
| D | pkcs7_trust.c | 40 if (x509->verified) in pkcs7_validate_trust_one() 41 goto verified; in pkcs7_validate_trust_one() 124 verified: in pkcs7_validate_trust_one() 126 x509->verified = true; in pkcs7_validate_trust_one() 128 p->verified = true; in pkcs7_validate_trust_one()
|
| /kernel/linux/linux-6.6/crypto/asymmetric_keys/ |
| D | pkcs7_trust.c | 40 if (x509->verified) in pkcs7_validate_trust_one() 41 goto verified; in pkcs7_validate_trust_one() 124 verified: in pkcs7_validate_trust_one() 126 x509->verified = true; in pkcs7_validate_trust_one() 128 p->verified = true; in pkcs7_validate_trust_one()
|
| /kernel/linux/linux-6.6/security/integrity/ima/ |
| D | Kconfig | 197 be signed and verified by a public key on the trusted IMA 200 Kernel image signatures can not be verified by the original 210 and verified by a public key on the trusted IMA keyring. 212 Kernel module signatures can only be verified by IMA-appraisal, 222 and verified by a key on the trusted IMA keyring.
|
| /kernel/linux/linux-5.10/security/integrity/ima/ |
| D | Kconfig | 197 be signed and verified by a public key on the trusted IMA 200 Kernel image signatures can not be verified by the original 210 and verified by a public key on the trusted IMA keyring. 212 Kernel module signatures can only be verified by IMA-appraisal, 222 and verified by a key on the trusted IMA keyring.
|
| /kernel/linux/linux-5.10/fs/verity/ |
| D | verify.c | 20 * @dindex: (in) the index of the data block being verified 74 * only ascend the tree until an already-verified page is seen, as indicated by 115 * the way until we find a verified hash page, indicated by PageChecked; in verify_page() 171 pr_debug("Verified hash page at level %d, now want %s:%*phN\n", in verify_page() 276 * fsverity_get_verified_data_size() - get verified data size of a verity file 279 * Return: verified data size
|
| /kernel/linux/linux-6.6/Documentation/firmware-guide/acpi/ |
| D | chromeos-acpi-device.rst | 40 - Chrome OS verified boot data 284 - Offset in CMOS bank 0 of the verified boot non-volatile storage block, counting from 290 - Size in bytes of the verified boot non-volatile storage block. 306 VDTA (Chrome OS verified boot data) 308 This control method returns the verified boot data block shared between the firmware 317 A buffer containing the verified boot data block.
|
| /kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
| D | test_stack_var_off.c | 40 * read would be rejected because the stack slot cannot be verified as in probe() 42 * stack slot still cannot be verified, but the write inhibits the in probe()
|
| /kernel/linux/linux-6.6/drivers/mtd/tests/ |
| D | subpagetest.c | 258 pr_info("verified up to eraseblock %u\n", i); in verify_all_eraseblocks_ff() 264 pr_info("verified %u eraseblocks\n", i); in verify_all_eraseblocks_ff() 355 pr_info("verified up to eraseblock %u\n", i); in mtd_subpagetest_init() 361 pr_info("verified %u eraseblocks\n", i); in mtd_subpagetest_init() 399 pr_info("verified up to eraseblock %u\n", i); in mtd_subpagetest_init() 405 pr_info("verified %u eraseblocks\n", i); in mtd_subpagetest_init()
|
| D | oobtest.c | 326 pr_info("verified up to eraseblock %u\n", i); in verify_all_eraseblocks() 332 pr_info("verified %u eraseblocks\n", i); in verify_all_eraseblocks() 440 pr_info("verified up to eraseblock %u\n", i); in mtd_oobtest_init() 446 pr_info("verified %u eraseblocks\n", i); in mtd_oobtest_init() 704 pr_info("verified up to eraseblock %u\n", i); in mtd_oobtest_init() 710 pr_info("verified %u eraseblocks\n", i); in mtd_oobtest_init()
|
| /kernel/linux/linux-5.10/drivers/mtd/tests/ |
| D | subpagetest.c | 258 pr_info("verified up to eraseblock %u\n", i); in verify_all_eraseblocks_ff() 264 pr_info("verified %u eraseblocks\n", i); in verify_all_eraseblocks_ff() 355 pr_info("verified up to eraseblock %u\n", i); in mtd_subpagetest_init() 361 pr_info("verified %u eraseblocks\n", i); in mtd_subpagetest_init() 399 pr_info("verified up to eraseblock %u\n", i); in mtd_subpagetest_init() 405 pr_info("verified %u eraseblocks\n", i); in mtd_subpagetest_init()
|
| D | oobtest.c | 326 pr_info("verified up to eraseblock %u\n", i); in verify_all_eraseblocks() 332 pr_info("verified %u eraseblocks\n", i); in verify_all_eraseblocks() 440 pr_info("verified up to eraseblock %u\n", i); in mtd_oobtest_init() 446 pr_info("verified %u eraseblocks\n", i); in mtd_oobtest_init() 709 pr_info("verified up to eraseblock %u\n", i); in mtd_oobtest_init() 715 pr_info("verified %u eraseblocks\n", i); in mtd_oobtest_init()
|
| /kernel/linux/linux-5.10/drivers/clk/sunxi-ng/ |
| D | ccu-sun50i-h6-r.c | 80 * of the hardware block is verified with "3.1 Memory Mapping" chapter in 81 * "Allwinner H6 V200 User Manual V1.1"; and the parent APB buses are verified 112 * this mod clock is proven by BSP clock header, and the dividers are verified
|
| /kernel/linux/linux-6.6/Documentation/ABI/testing/ |
| D | sysfs-driver-chromeos-acpi | 132 Returns offset in CMOS bank 0 of the verified boot non-volatile 142 Return the size in bytes of the verified boot non-volatile 150 Returns the verified boot data block shared between the
|
| D | sysfs-class-chromeos-driver-cros-ec-vbc | 5 Read/write the verified boot context data included on a
|
| /kernel/linux/linux-5.10/drivers/md/ |
| D | dm-verity-verify-sig.c | 100 * @root_hash: For verity, the roothash/data to be verified. 101 * @root_hash_len: Size of the roothash/data to be verified.
|
| /kernel/linux/linux-5.10/Documentation/admin-guide/sysctl/ |
| D | user.rst | 26 verified to be below the per user limit in that user namespace. 30 in (user namespaces can be nested) and verified to be below the per user
|
| /kernel/linux/linux-6.6/Documentation/admin-guide/sysctl/ |
| D | user.rst | 26 verified to be below the per user limit in that user namespace. 30 in (user namespaces can be nested) and verified to be below the per user
|
| /kernel/linux/linux-6.6/drivers/md/ |
| D | dm-verity-verify-sig.c | 109 * @root_hash: For verity, the roothash/data to be verified. 110 * @root_hash_len: Size of the roothash/data to be verified.
|
| /kernel/linux/linux-6.6/drivers/clk/sunxi-ng/ |
| D | ccu-sun50i-h6-r.c | 81 * of the hardware block is verified with "3.1 Memory Mapping" chapter in 82 * "Allwinner H6 V200 User Manual V1.1"; and the parent APB buses are verified 117 * this mod clock is proven by BSP clock header, and the dividers are verified
|
| /kernel/linux/linux-6.6/drivers/gpu/drm/amd/display/dc/link/ |
| D | link_resource.c | 94 /* remove 128b/132b encoding capability by limiting verified link rate to HBR3 */ in link_restore_res_map() 108 /* remove 128b/132b encoding capability by limiting verified link rate to HBR3 */ in link_restore_res_map()
|
| /kernel/linux/linux-5.10/Documentation/ABI/testing/ |
| D | sysfs-class-chromeos-driver-cros-ec-vbc | 5 Read/write the verified boot context data included on a
|
| /kernel/linux/linux-5.10/drivers/staging/comedi/drivers/ |
| D | ni_mio_cs.c | 58 .caldac = { mb88341 }, /* verified */ 72 .caldac = { ad8804_debug }, /* verified */
|