| /OK3568_Linux_fs/kernel/crypto/asymmetric_keys/ |
| H A D | pkcs7_trust.c | 40 if (x509->verified) in pkcs7_validate_trust_one() 41 goto verified; in pkcs7_validate_trust_one() 124 verified: in pkcs7_validate_trust_one() 126 x509->verified = true; in pkcs7_validate_trust_one() 128 p->verified = true; in pkcs7_validate_trust_one()
|
| H A D | x509_parser.h | 37 bool verified; member
|
| /OK3568_Linux_fs/u-boot/common/ |
| H A D | image-sig.c | 266 int verified = 0; in fit_image_verify_sig() local 281 verified = 1; in fit_image_verify_sig() 292 if (verified) in fit_image_verify_sig() 454 int verified = 0; in fit_config_verify_sig() local 469 verified = 1; in fit_config_verify_sig() 480 if (verified) in fit_config_verify_sig()
|
| /OK3568_Linux_fs/buildroot/package/vboot-utils/ |
| H A D | Config.in.host | 5 Chromium OS verified boot utilities: futility and cgpt. 7 https://www.chromium.org/chromium-os/chromiumos-design-docs/verified-boot
|
| /OK3568_Linux_fs/u-boot/doc/SPL/ |
| H A D | README.spl-secure-boot | 1 Overview of SPL verified boot on powerpc/mpc85xx & arm/layerscape platforms 7 This document provides an overview of how SPL verified boot works on powerpc/
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/device-mapper/ |
| H A D | verity.rst | 127 Hash blocks are still verified each time they are read from the hash device, 129 blocks, and a hash block will not be verified any more after all the data 130 blocks it covers have been verified anyway. 142 dm-verity is meant to be set up as part of a verified boot path. This 148 After instantiation, all hashes will be verified on-demand during 149 disk access. If they cannot be verified up to the root node of the 159 corrupted data will be verified using the cryptographic hash of the 201 the command-line is verified.
|
| /OK3568_Linux_fs/u-boot/doc/uImage.FIT/ |
| H A D | beaglebone_vboot.txt | 7 Before reading this, please read verified-boot.txt and signature.txt. These 11 verified boot works in U-Boot. There is also a test which runs through the 16 for an example of how to enable verified boot using U-Boot. 22 packaged with the kernel. In particular this is important with verified boot, 24 public keys can be changed and verified boot is useless. An attacker can 37 1. Build U-Boot for the board, with the verified boot options enabled. 68 b. Configure and build U-Boot with verified boot enabled: 199 'required' property, which tells U-Boot that this key must be verified for the 302 'dev' and the '+' means that it verified. If it showed '-' that would be bad. 304 Once the configuration is verified it is then possible to rely on the hashes [all …]
|
| H A D | verified-boot.txt | 16 which use verified boot. Since the machine will only run software that has 26 be verified using a public key. As its name suggests the public key can be 96 a standard place. Then when a FIT is loaded it can be verified using that
|
| H A D | signature.txt | 11 that it can be verified using a public key later. Provided that the private 13 any image can be verified in this way. 15 See verified-boot.txt for more general information on verified boot. 150 - required: If present this indicates that the key must be verified for the 152 normally verified by the FIT image booting algorithm. Valid values are 311 verified later even if the FIT has been signed with other keys in the 317 FITs are verified when loaded. After the configuration is selected a list 319 each image must be verified against those keys. This means that every image 352 Please see doc/uImage.FIT/verified-boot.txt for more information
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/initscripts/initscripts-1.0/ |
| H A D | volatiles | 1 # This configuration file lists filesystem objects that should get verified 21 # Thus, if a link is in the place to be verified, the object will be created
|
| /OK3568_Linux_fs/buildroot/package/qemu/ |
| H A D | qemu.hash | 1 # Locally computed, tarball verified with GPG signature
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/sysctl/ |
| H A D | user.rst | 26 verified to be below the per user limit in that user namespace. 30 in (user namespaces can be nested) and verified to be below the per user
|
| /OK3568_Linux_fs/kernel/Documentation/ABI/testing/ |
| H A D | sysfs-class-chromeos-driver-cros-ec-vbc | 5 Read/write the verified boot context data included on a
|
| /OK3568_Linux_fs/kernel/security/integrity/ima/ |
| H A D | Kconfig | 203 be signed and verified by a public key on the trusted IMA 206 Kernel image signatures can not be verified by the original 216 and verified by a public key on the trusted IMA keyring. 218 Kernel module signatures can only be verified by IMA-appraisal, 228 and verified by a key on the trusted IMA keyring.
|
| /OK3568_Linux_fs/kernel/tools/memory-model/scripts/ |
| H A D | checkalllitmus.sh | 64 echo All litmus tests verified as was expected. 1>&2
|
| /OK3568_Linux_fs/buildroot/boot/grub2/ |
| H A D | 0033-verifiers-Move-verifiers-API-to-kernel-image.patch | 1158 -verified_free (grub_verified_t verified) 1160 - if (verified) 1162 - grub_free (verified->buf); 1163 - grub_free (verified); 1170 - grub_verified_t verified = file->data; 1172 - grub_memcpy (buf, (char *) verified->buf + file->offset, len); 1179 - grub_verified_t verified = file->data; 1181 - grub_file_close (verified->file); 1182 - verified_free (verified); 1202 - grub_verified_t verified = NULL; [all …]
|
| /OK3568_Linux_fs/buildroot/package/uboot-tools/ |
| H A D | Config.in | 41 private key such that it can be verified using a public key 44 be verified in this way.
|
| H A D | Config.in.host | 35 private key such that it can be verified using a public key 38 be verified in this way.
|
| /OK3568_Linux_fs/kernel/arch/arm64/boot/dts/qcom/ |
| H A D | msm8992-bullhead-rev-101.dts | 253 /* TODO: get this verified 266 /* TODO: get this verified
|
| /OK3568_Linux_fs/buildroot/package/python-pyqt5/ |
| H A D | 0004-drop-qttest-qtestmouse-waitforevents.patch | 10 dropped it unconditionally. This can be verified by diffing PyQt 5.10
|
| /OK3568_Linux_fs/buildroot/package/libusb/ |
| H A D | 0001-linux_usbfs-Fix-parsing-of-descriptors-for-multi-con.patch | 48 * config descriptor with verified bLength fields, with descriptors
|
| /OK3568_Linux_fs/buildroot/package/gobject-introspection/ |
| H A D | Config.in | 14 # can be verified.
|
| /OK3568_Linux_fs/kernel/Documentation/w1/slaves/ |
| H A D | w1_ds2413.rst | 33 Bit 4-7: Complement of Bit 3 to Bit 0 (verified by the kernel module)
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/LSM/ |
| H A D | LoadPin.rst | 8 such as dm-verity or CDROM. This allows systems that have a verified
|
| /OK3568_Linux_fs/buildroot/package/openvmtools/ |
| H A D | 0012-Make-HgfsConvertFromNtTimeNsec-aware-of-64-bit-time_.patch | 6 I verified that this function behaves as expected on x86_64, i386 with
|