| /linux/crypto/asymmetric_keys/ |
| H A D | pkcs7_trust.c | 40 if (x509->verified) in pkcs7_validate_trust_one() 41 goto verified; in pkcs7_validate_trust_one() 124 verified: in pkcs7_validate_trust_one() 126 x509->verified = true; in pkcs7_validate_trust_one() 128 p->verified = true; in pkcs7_validate_trust_one()
|
| /linux/Documentation/firmware-guide/acpi/ |
| H A D | chromeos-acpi-device.rst | 40 - Chrome OS verified boot data 284 - Offset in CMOS bank 0 of the verified boot non-volatile storage block, counting from 290 - Size in bytes of the verified boot non-volatile storage block. 306 VDTA (Chrome OS verified boot data) 308 This control method returns the verified boot data block shared between the firmware 317 A buffer containing the verified boot data block.
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-driver-chromeos-acpi | 132 Returns offset in CMOS bank 0 of the verified boot non-volatile 142 Return the size in bytes of the verified boot non-volatile 150 Returns the verified boot data block shared between the
|
| H A D | sysfs-class-chromeos-driver-cros-ec-vbc | 5 Read/write the verified boot context data included on a
|
| H A D | sysfs-firmware-ofw | 48 blob, and verified at late_initcall time. The sysfs
|
| H A D | sysfs-driver-w1_therm | 63 actual resolution is read back from the chip and verified. Error
|
| /linux/tools/memory-model/scripts/ |
| H A D | checktheselitmus.sh | 41 echo All litmus tests verified as was expected. 1>&2
|
| H A D | checkalllitmus.sh | 63 echo All litmus tests verified as was expected. 1>&2
|
| /linux/Documentation/admin-guide/sysctl/ |
| H A D | user.rst | 26 verified to be below the per user limit in that user namespace. 30 in (user namespaces can be nested) and verified to be below the per user
|
| /linux/security/integrity/ima/ |
| H A D | Kconfig | 198 be signed and verified by a public key on the trusted IMA 201 Kernel image signatures can not be verified by the original 211 and verified by a public key on the trusted IMA keyring. 213 Kernel module signatures can only be verified by IMA-appraisal, 223 and verified by a key on the trusted IMA keyring.
|
| /linux/Documentation/gpu/nova/core/ |
| H A D | falcon.rst | 34 the chip. The HS binary includes a signature in it which is verified at boot. 62 memory into the Falcon's IMEM/DMEM. Once the HS ucode is loaded, it is verified 65 Once the verified HS code is running on a Falcon, it can verify and load other 80 verified by the hardware and run, the CPU itself typically does not load
|
| /linux/Documentation/w1/slaves/ |
| H A D | w1_ds2413.rst | 33 Bit 4-7: Complement of Bit 3 to Bit 0 (verified by the kernel module)
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | LoadPin.rst | 8 such as dm-verity or CDROM. This allows systems that have a verified
|
| /linux/Documentation/networking/ |
| H A D | driver.rst | 14 be verified. For example, for ethernet check it with
|
| /linux/Documentation/security/tpm/ |
| H A D | tpm-security.rst | 117 then be verified by certification in user-space. Therefore, this chain 170 certificate itself must be verified to chain back to the manufacturer 206 signature of the returned certifyInfo is verified against the public
|
| /linux/Documentation/driver-api/memory-devices/ |
| H A D | ti-gpmc.rst | 45 Generic timing routine has been verified to work properly on
|
| /linux/Documentation/filesystems/xfs/ |
| H A D | xfs-self-describing-metadata.rst | 97 metadata block can be verified as being in the correct place without needing to 183 is extensively verified and if it is OK we then update the LSN from the last 346 inode is already extensively verified during writeback in xfs_iflush_int, so the
|
| /linux/Documentation/bpf/ |
| H A D | prog_cgroup_sysctl.rst | 80 string value set by the helper is treated and verified by kernel same way as
|
| /linux/Documentation/i2c/ |
| H A D | fault-codes.rst | 108 have verified that functionality was supported before it
|
| /linux/Documentation/admin-guide/mm/ |
| H A D | multigen_lru.rst | 48 verified on x86 varieties other than Intel and AMD. If it is
|
| /linux/Documentation/userspace-api/ |
| H A D | check_exec.rst | 130 user session) where scripts' integrity is verified (e.g. with IMA/EVM or
|
| /linux/Documentation/filesystems/nfs/ |
| H A D | nfsd-io-modes.rst | 121 verified to have proper offset/len (logical_block_size) and
|
| /linux/Documentation/crypto/ |
| H A D | asymmetric-keys.rst | 420 be linked will be verified using the signing key. The requested key is added 421 to the keyring only if the signature is successfully verified. -ENOKEY is
|
| /linux/Documentation/driver-api/ |
| H A D | device_link.rst | 236 verified upon device link addition that the supplier is not dependent 280 verified by checking the consumer device is not in the wait_for_suppliers
|
| /linux/Documentation/driver-api/usb/ |
| H A D | dwc3.rst | 59 gadget drivers. We have verified both *ConfigFS* [#configfs]_ and 124 After all these are verified, then here's how to capture enough
|