Searched full:tampering (Results 1 – 22 of 22) sorted by relevance
124 provides a reduced level of security because only offline tampering of the125 data device's content will be detected, not online tampering.160 tampering with any data on the device and the hash data.
26 Say yes if kernel should protect command streams from tampering.
43 Physical tampering is detected.
37 // Fully qualify the `PinnedDrop`, as to avoid any tampering. in pinned_drop()
7 whether the CPU or APU has been fused to prevent tampering.
46 3. PARTITIONS TAMPERING (EXAMPLE)
4 data tampering. It does this by creating a hash for each data block of
22 * Test of instruction analysis against tampering.
329 "malicious tampering.\n"); in carl9170_fw()
13 * Please note that we are tampering with the only flash chip in the
368 To avoid tampering with this and other values stored there, a HMAC is added to
403 resistance to tampering or some side-channel attacks).
2307 * post-scan tampering in eb_parse()2311 "Cannot prevent post-scan tampering without RO capable vm\n"); in eb_parse()
550 accidentally tampering with the contents. The capability flags actually
858 "TamperingDetected": "Physical tampering of the monitored entity is detected."
156 # Sign the journal for anti-tampering
606 // front panel interfaces and/or detect tampering with those in ipmiGetChassisCap()
1990 * and report errors if we think we're tampering with a GPIo that might
2764 * doing non compliant hot tampering on the BUS, when
679 <Annotation Term="OData.Description" String="Physical tampering of the monitored entity is detected."/>
679 …<Annotation Term="OData.Description" String="Physical tampering of the monitored entity is detecte…