Home
last modified time | relevance | path

Searched full:verified (Results 1 – 25 of 651) sorted by relevance

12345678910>>...27

/OK3568_Linux_fs/buildroot/package/rust-bin/
H A Drust-bin.hash2 # Verified using https://static.rust-lang.org/dist/rust-1.54.0-i686-unknown-linux-gnu.tar.xz.asc
5 # Verified using https://static.rust-lang.org/dist/rust-1.54.0-x86_64-unknown-linux-gnu.tar.xz.asc
8 # Verified using https://static.rust-lang.org/dist/rust-std-1.54.0-aarch64-unknown-linux-gnu.tar.xz…
11 # Verified using https://static.rust-lang.org/dist/rust-std-1.54.0-aarch64-unknown-linux-musl.tar.x…
14 # Verified using https://static.rust-lang.org/dist/rust-std-1.54.0-arm-unknown-linux-gnueabi.tar.xz…
17 # Verified using https://static.rust-lang.org/dist/rust-std-1.54.0-arm-unknown-linux-gnueabihf.tar.…
20 # Verified using https://static.rust-lang.org/dist/rust-std-1.54.0-arm-unknown-linux-musleabihf.tar…
23 # Verified using https://static.rust-lang.org/dist/rust-std-1.54.0-arm-unknown-linux-musleabi.tar.x…
26 # Verified using https://static.rust-lang.org/dist/rust-std-1.54.0-armv5te-unknown-linux-gnueabi.ta…
29 # Verified using https://static.rust-lang.org/dist/rust-std-1.54.0-armv5te-unknown-linux-musleabi.t…
[all …]
/OK3568_Linux_fs/u-boot/doc/uImage.FIT/
H A Dsignature.txt11 that it can be verified using a public key later. Provided that the private
13 any image can be verified in this way.
15 See verified-boot.txt for more general information on verified boot.
150 - required: If present this indicates that the key must be verified for the
152 normally verified by the FIT image booting algorithm. Valid values are
311 verified later even if the FIT has been signed with other keys in the
317 FITs are verified when loaded. After the configuration is selected a list
319 each image must be verified against those keys. This means that every image
349 Simple Verified Boot Test
352 Please see doc/uImage.FIT/verified-boot.txt for more information
[all …]
H A Dverified-boot.txt1 U-Boot Verified Boot
6 Verified boot here means the verification of all software loaded into a
10 Verified boot extends from the moment of system reset to as far as you wish
16 which use verified boot. Since the machine will only run software that has
24 Verified boot uses cryptographic algorithms to 'sign' software images.
26 be verified using a public key. As its name suggests the public key can be
96 a standard place. Then when a FIT is loaded it can be verified using that
H A Dbeaglebone_vboot.txt1 Verified Boot on the Beaglebone Black
7 Before reading this, please read verified-boot.txt and signature.txt. These
11 verified boot works in U-Boot. There is also a test which runs through the
16 for an example of how to enable verified boot using U-Boot.
22 packaged with the kernel. In particular this is important with verified boot,
24 public keys can be changed and verified boot is useless. An attacker can
37 1. Build U-Boot for the board, with the verified boot options enabled.
68 b. Configure and build U-Boot with verified boot enabled:
199 'required' property, which tells U-Boot that this key must be verified for the
302 'dev' and the '+' means that it verified. If it showed '-' that would be bad.
[all …]
/OK3568_Linux_fs/kernel/Documentation/admin-guide/device-mapper/
H A Dverity.rst127 Hash blocks are still verified each time they are read from the hash device,
129 blocks, and a hash block will not be verified any more after all the data
130 blocks it covers have been verified anyway.
142 dm-verity is meant to be set up as part of a verified boot path. This
148 After instantiation, all hashes will be verified on-demand during
149 disk access. If they cannot be verified up to the root node of the
159 corrupted data will be verified using the cryptographic hash of the
201 the command-line is verified.
/OK3568_Linux_fs/u-boot/test/py/tests/
H A Dtest_vboot.py5 # U-Boot Verified Boot Test
8 This tests verified boot in the following ways:
12 - Check that verification shows that no keys are verified
14 - Check that verification shows that a key is now verified
35 """Test verified boot signing with mkimage and verification with 'bootm'.
71 with cons.log.section('Verified boot %s %s' % (sha_algo, test_type)):
106 """Test verified boot with the given hash algorithm.
/OK3568_Linux_fs/device/rockchip/common/data/
H A Dadbd-auth2 VERIFIED=/tmp/.adb_auth_verified
4 if [ -f "$VERIFIED" ]; then
13 touch $VERIFIED
/OK3568_Linux_fs/buildroot/package/android-tools/
H A Dadbd-auth2 VERIFIED=/tmp/.adb_auth_verified
4 if [ -f "$VERIFIED" ]; then
13 touch $VERIFIED
/OK3568_Linux_fs/u-boot/include/android_avb/
H A Davb_slot_verify.h186 * successfully verified.
206 * The partitions loaded and verified from from the slot are
212 * Rollback indexes for the verified slot are stored in the
258 * will end up pointing to the vbmeta partition for the verified
260 * partition of the verified slot. If the flag
270 * the slot that was verified.
277 * struct is verified and descriptors will not processed. The return
358 * AVB_SLOT_VERIFY_RESULT_OK is returned if everything is verified
362 * everything is verified correctly out but one or more public keys
/OK3568_Linux_fs/kernel/crypto/asymmetric_keys/
H A Dpkcs7_trust.c40 if (x509->verified) in pkcs7_validate_trust_one()
41 goto verified; in pkcs7_validate_trust_one()
124 verified: in pkcs7_validate_trust_one()
126 x509->verified = true; in pkcs7_validate_trust_one()
128 p->verified = true; in pkcs7_validate_trust_one()
/OK3568_Linux_fs/u-boot/post/drivers/
H A Drtc.c13 * The Real Time Clock (RTC) operation is verified by this test.
14 * The following features are verified:
16 * This is verified by analyzing the rtc_get() return status.
18 * This is verified by reading RTC in polling within
/OK3568_Linux_fs/kernel/security/integrity/ima/
H A DKconfig203 be signed and verified by a public key on the trusted IMA
206 Kernel image signatures can not be verified by the original
216 and verified by a public key on the trusted IMA keyring.
218 Kernel module signatures can only be verified by IMA-appraisal,
228 and verified by a key on the trusted IMA keyring.
/OK3568_Linux_fs/buildroot/package/vboot-utils/
H A DConfig.in.host5 Chromium OS verified boot utilities: futility and cgpt.
7 https://www.chromium.org/chromium-os/chromiumos-design-docs/verified-boot
/OK3568_Linux_fs/kernel/fs/verity/
H A Dverify.c20 * @dindex: (in) the index of the data block being verified
74 * only ascend the tree until an already-verified page is seen, as indicated by
108 * the way until we find a verified hash page, indicated by PageChecked; in verify_page()
164 pr_debug("Verified hash page at level %d, now want %s:%*phN\n", in verify_page()
282 * Use an unbound workqueue to allow bios to be verified in parallel in fsverity_init_workqueue()
/OK3568_Linux_fs/kernel/drivers/mtd/tests/
H A Dsubpagetest.c258 pr_info("verified up to eraseblock %u\n", i); in verify_all_eraseblocks_ff()
264 pr_info("verified %u eraseblocks\n", i); in verify_all_eraseblocks_ff()
355 pr_info("verified up to eraseblock %u\n", i); in mtd_subpagetest_init()
361 pr_info("verified %u eraseblocks\n", i); in mtd_subpagetest_init()
399 pr_info("verified up to eraseblock %u\n", i); in mtd_subpagetest_init()
405 pr_info("verified %u eraseblocks\n", i); in mtd_subpagetest_init()
/OK3568_Linux_fs/u-boot/common/
H A Dimage-sig.c266 int verified = 0; in fit_image_verify_sig() local
281 verified = 1; in fit_image_verify_sig()
292 if (verified) in fit_image_verify_sig()
454 int verified = 0; in fit_config_verify_sig() local
469 verified = 1; in fit_config_verify_sig()
480 if (verified) in fit_config_verify_sig()
/OK3568_Linux_fs/u-boot/doc/SPL/
H A DREADME.spl-secure-boot1 Overview of SPL verified boot on powerpc/mpc85xx & arm/layerscape platforms
7 This document provides an overview of how SPL verified boot works on powerpc/
/OK3568_Linux_fs/buildroot/boot/grub2/
H A D0033-verifiers-Move-verifiers-API-to-kernel-image.patch1158 -verified_free (grub_verified_t verified)
1160 - if (verified)
1162 - grub_free (verified->buf);
1163 - grub_free (verified);
1170 - grub_verified_t verified = file->data;
1172 - grub_memcpy (buf, (char *) verified->buf + file->offset, len);
1179 - grub_verified_t verified = file->data;
1181 - grub_file_close (verified->file);
1182 - verified_free (verified);
1202 - grub_verified_t verified = NULL;
[all …]
/OK3568_Linux_fs/yocto/poky/meta/recipes-core/initscripts/initscripts-1.0/
H A Dvolatiles1 # This configuration file lists filesystem objects that should get verified
21 # Thus, if a link is in the place to be verified, the object will be created
/OK3568_Linux_fs/kernel/drivers/clk/sunxi-ng/
H A Dccu-sun50i-h6-r.c80 * of the hardware block is verified with "3.1 Memory Mapping" chapter in
81 * "Allwinner H6 V200 User Manual V1.1"; and the parent APB buses are verified
112 * this mod clock is proven by BSP clock header, and the dividers are verified
/OK3568_Linux_fs/buildroot/package/uboot-tools/
H A DConfig.in41 private key such that it can be verified using a public key
44 be verified in this way.
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/
H A Dx509_crt.h501 * \param crt The certificate chain to be verified.
505 * CN need not be verified.
541 * \param crt The certificate chain to be verified.
546 * CN need not be verified.
579 * \param crt The certificate chain to be verified.
584 * CN need not be verified.
647 * \param crt The certificate chain to be verified.
654 * CN need not be verified.
723 * \param crt a certificate to be verified
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/
H A Dx509_crt.h501 * \param crt The certificate chain to be verified.
505 * CN need not be verified.
541 * \param crt The certificate chain to be verified.
546 * CN need not be verified.
579 * \param crt The certificate chain to be verified.
584 * CN need not be verified.
647 * \param crt The certificate chain to be verified.
654 * CN need not be verified.
723 * \param crt a certificate to be verified
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/
H A Dx509_crt.h501 * \param crt The certificate chain to be verified.
505 * CN need not be verified.
541 * \param crt The certificate chain to be verified.
546 * CN need not be verified.
579 * \param crt The certificate chain to be verified.
584 * CN need not be verified.
647 * \param crt The certificate chain to be verified.
654 * CN need not be verified.
723 * \param crt a certificate to be verified
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/
H A Dx509_crt.h501 * \param crt The certificate chain to be verified.
505 * CN need not be verified.
541 * \param crt The certificate chain to be verified.
546 * CN need not be verified.
579 * \param crt The certificate chain to be verified.
584 * CN need not be verified.
647 * \param crt The certificate chain to be verified.
654 * CN need not be verified.
723 * \param crt a certificate to be verified

12345678910>>...27