Home | History | Annotate | Download | only in 5.1

Lines Matching full:verification

4259 <li>Perform verification on every boot sequence</li>
4260 <li>Start verification from a hardware key that is the root of trust, and go
4262 <li>Implement each stage of verification to check the integrity and authenticity
4264 <li>Use verification algorithms as strong as current recommendations