| /Linux-v5.15/Documentation/admin-guide/device-mapper/ |
| D | verity.rst | 127 Hash blocks are still verified each time they are read from the hash device, 129 blocks, and a hash block will not be verified any more after all the data 130 blocks it covers have been verified anyway. 147 dm-verity is meant to be set up as part of a verified boot path. This 153 After instantiation, all hashes will be verified on-demand during 154 disk access. If they cannot be verified up to the root node of the 164 corrupted data will be verified using the cryptographic hash of the 206 the command-line is verified.
|
| /Linux-v5.15/crypto/asymmetric_keys/ |
| D | pkcs7_trust.c | 40 if (x509->verified) in pkcs7_validate_trust_one() 41 goto verified; in pkcs7_validate_trust_one() 124 verified: in pkcs7_validate_trust_one() 126 x509->verified = true; in pkcs7_validate_trust_one() 128 p->verified = true; in pkcs7_validate_trust_one()
|
| D | pkcs7_verify.c | 367 pr_devel("Verified signature %u\n", sinfo->index); in pkcs7_verify_one() 375 * @pkcs7: The PKCS#7 message to be verified 381 * message can be verified. 476 * @data: The data to be verified
|
| D | x509_parser.h | 37 bool verified; member
|
| /Linux-v5.15/security/integrity/ima/ |
| D | Kconfig | 205 be signed and verified by a public key on the trusted IMA 208 Kernel image signatures can not be verified by the original 218 and verified by a public key on the trusted IMA keyring. 220 Kernel module signatures can only be verified by IMA-appraisal, 230 and verified by a key on the trusted IMA keyring.
|
| /Linux-v5.15/fs/verity/ |
| D | verify.c | 20 * @dindex: (in) the index of the data block being verified 74 * only ascend the tree until an already-verified page is seen, as indicated by 108 * the way until we find a verified hash page, indicated by PageChecked; in verify_page() 164 pr_debug("Verified hash page at level %d, now want %s:%*phN\n", in verify_page() 282 * Use an unbound workqueue to allow bios to be verified in parallel in fsverity_init_workqueue()
|
| /Linux-v5.15/tools/testing/selftests/bpf/progs/ |
| D | test_stack_var_off.c | 40 * read would be rejected because the stack slot cannot be verified as in probe() 42 * stack slot still cannot be verified, but the write inhibits the in probe()
|
| D | linked_funcs2.c | 30 /* This function can't be verified as global, as it assumes raw_tp/sys_enter
|
| /Linux-v5.15/drivers/mtd/tests/ |
| D | subpagetest.c | 258 pr_info("verified up to eraseblock %u\n", i); in verify_all_eraseblocks_ff() 264 pr_info("verified %u eraseblocks\n", i); in verify_all_eraseblocks_ff() 355 pr_info("verified up to eraseblock %u\n", i); in mtd_subpagetest_init() 361 pr_info("verified %u eraseblocks\n", i); in mtd_subpagetest_init() 399 pr_info("verified up to eraseblock %u\n", i); in mtd_subpagetest_init() 405 pr_info("verified %u eraseblocks\n", i); in mtd_subpagetest_init()
|
| D | oobtest.c | 326 pr_info("verified up to eraseblock %u\n", i); in verify_all_eraseblocks() 332 pr_info("verified %u eraseblocks\n", i); in verify_all_eraseblocks() 440 pr_info("verified up to eraseblock %u\n", i); in mtd_oobtest_init() 446 pr_info("verified %u eraseblocks\n", i); in mtd_oobtest_init() 704 pr_info("verified up to eraseblock %u\n", i); in mtd_oobtest_init() 710 pr_info("verified %u eraseblocks\n", i); in mtd_oobtest_init()
|
| /Linux-v5.15/drivers/md/ |
| D | dm-verity-verify-sig.c | 100 * @root_hash: For verity, the roothash/data to be verified. 101 * @root_hash_len: Size of the roothash/data to be verified.
|
| /Linux-v5.15/Documentation/admin-guide/sysctl/ |
| D | user.rst | 26 verified to be below the per user limit in that user namespace. 30 in (user namespaces can be nested) and verified to be below the per user
|
| /Linux-v5.15/drivers/clk/sunxi-ng/ |
| D | ccu-sun50i-h6-r.c | 80 * of the hardware block is verified with "3.1 Memory Mapping" chapter in 81 * "Allwinner H6 V200 User Manual V1.1"; and the parent APB buses are verified 114 * this mod clock is proven by BSP clock header, and the dividers are verified
|
| /Linux-v5.15/Documentation/ABI/testing/ |
| D | sysfs-class-chromeos-driver-cros-ec-vbc | 5 Read/write the verified boot context data included on a
|
| /Linux-v5.15/tools/testing/selftests/bpf/verifier/ |
| D | search_pruning.c | 85 "search pruning: all branches should be verified (nop operation)", 112 "search pruning: all branches should be verified (invalid stack access)",
|
| /Linux-v5.15/drivers/comedi/drivers/ |
| D | ni_mio_cs.c | 58 .caldac = { mb88341 }, /* verified */ 72 .caldac = { ad8804_debug }, /* verified */
|
| /Linux-v5.15/tools/testing/selftests/drivers/net/mlxsw/ |
| D | qos_dscp_bridge.sh | 7 # tag is verified at $h2. 11 # verified at $h1--it should match the original tag.
|
| D | qos_dscp_router.sh | 8 # forwarded by the switch. That is verified at $h2. ICMP responses are formed 10 # intact, which is verified at $h1.
|
| /Linux-v5.15/Documentation/filesystems/ |
| D | fsverity.rst | 26 automatically verified against the file's Merkle tree. Reads of any 495 fs-verity. In this case, the plaintext data is verified rather than 542 fs-verity ensures that all reads of a verity file's data are verified, 546 already verified). Below, we describe how filesystems implement this. 576 an already-verified hash page is seen, as indicated by the PageChecked 596 encrypted, the pages must be decrypted before being verified. To 779 Uptodate until they've been verified. Currently, each
|
| /Linux-v5.15/Documentation/admin-guide/LSM/ |
| D | LoadPin.rst | 8 such as dm-verity or CDROM. This allows systems that have a verified
|
| /Linux-v5.15/arch/arm64/boot/dts/qcom/ |
| D | msm8992-bullhead-rev-101.dts | 263 /* TODO: get this verified 276 /* TODO: get this verified
|
| /Linux-v5.15/arch/powerpc/include/asm/ |
| D | ohare.h | 38 #define OH_VIA_ENABLE 0x10000 /* Is apparently wrong, to be verified */
|
| /Linux-v5.15/fs/nilfs2/ |
| D | page.h | 29 BUFFER_FNS(NILFS_Checked, nilfs_checked) /* buffer is verified */
|
| /Linux-v5.15/tools/memory-model/scripts/ |
| D | checkalllitmus.sh | 64 echo All litmus tests verified as was expected. 1>&2
|
| /Linux-v5.15/certs/ |
| D | system_keyring.c | 173 * @data: The data to be verified (NULL if expecting internal data). 257 * @data: The data to be verified (NULL if expecting internal data).
|