Home
last modified time | relevance | path

Searched refs:verified (Results 1 – 21 of 21) sorted by relevance

/device/linaro/bootloader/arm-trusted-firmware/docs/spd/
Dtrusty-dispatcher.rst15 verified and supported by NVIDIA's Tegra SoCs.
/device/linaro/bootloader/arm-trusted-firmware/docs/
Dtrusted-board-boot.rst142 The CoT is verified through the following sequence of steps. The system panics
146 read from the verified certificate. A hash of that key is calculated and
158 read from the verified certificate. A hash of that key is calculated and
161 non-trusted world public keys from the verified certificate.
168 is verified using the trusted world public key. If the signature
173 verified using the BL3x public key. If the signature verification succeeds,
198 Trusted SRAM using the IO storage framework. They are then verified by an
Dauth-framework.rst189 cannot be interpreted by the CM, e.g. if an image has to be verified using a
208 #. Tracking which images have been verified. In case an image is a part of
209 multiple CoTs then it should be verified only once e.g. the Trusted World
217 verified in the memory reserved by the platform for the BL31 image. By the
358 verified. Each image has a set of properties which allow the AM to verify it.
598 from the current image once it has been verified.
Dchange-log.rst680 loader images are verified by BL1 and BL2 during the cold boot path. BL1 and
/device/linaro/bootloader/edk2/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/
DPkcs7VerifyDxe.uni7 // structure. The PKCS#7 data to be verified must be ASN.1 (DER) encoded.
/device/linaro/bootloader/edk2/OvmfPkg/SmmAccess/
DSmmAccess2Dxe.inf4 # Q35 TSEG is expected to have been verified and set up by the SmmAccessPei
/device/linaro/bootloader/arm-trusted-firmware/docs/plat/
Dsocionext-uniphier.rst24 (and verified if the chip fuses are blown).
37 the image is verified by the SoC's own method.
/device/google/contexthub/firmware/os/core/
DappSec.c437 bool verified = memcmp(hash, state->dataBytes, SHA2_BLOCK_SIZE) == 0; in appSecVerifyEncryptedData() local
439 osLog(LOG_INFO, "%s: decryption verification: %s\n", __func__, verified ? "passed" : "failed"); in appSecVerifyEncryptedData()
/device/linaro/bootloader/edk2/ArmVirtPkg/
DArmVirt.dsc.inc369 …# override the default values from SecurityPkg to ensure images from all sources are verified in s…
/device/linaro/bootloader/OpenPlatformPkg/Platforms/ARM/VExpress/
DArmVExpress.dsc.inc441 …# override the default values from SecurityPkg to ensure images from all sources are verified in s…
/device/linaro/bootloader/edk2/Nt32Pkg/
DNt32Pkg.dsc262 …# override the default values from SecurityPkg to ensure images from all sources are verified in s…
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/decimaltestdata/
Dexp.decTest246 -- a biggie [result verified 3 ways]
/device/linaro/bootloader/edk2/QuarkPlatformPkg/
DQuarkMin.dsc345 …# override the default values from SecurityPkg to ensure images from all sources are verified in s…
DQuark.dsc385 …# override the default values from SecurityPkg to ensure images from all sources are verified in s…
/device/google/sunfish/
Dinit.hardware.rc364 # Update dm-verity state and set partition.*.verified properties
/device/google/bonito/
Dinit.hardware.rc377 # Update dm-verity state and set partition.*.verified properties
/device/google/redbull/
Dinit.hardware.rc425 # Update dm-verity state and set partition.*.verified properties
/device/google/crosshatch/
Dinit.hardware.rc399 # Update dm-verity state and set partition.*.verified properties
/device/google/coral/
Dinit.hardware.rc410 # Update dm-verity state and set partition.*.verified properties
/device/linaro/bootloader/edk2/EdkCompatibilityPkg/Other/Maintained/Tools/Pccts/
DCHANGES_FROM_133.txt1608 In MR13 these context guards are verified for proper semantics
/device/linaro/bootloader/edk2/BaseTools/Source/C/VfrCompile/Pccts/
DCHANGES_FROM_133.txt2290 In MR13 these context guards are verified for proper semantics