Home
last modified time | relevance | path

Searched full:nist (Results 1 – 25 of 50) sorted by relevance

12

/openbmc/openbmc/poky/meta/files/common-licenses/
H A DNIST-Software1 NIST-developed software is provided by NIST as a public service.
11 NIST-developed software is expressly provided "AS IS." NIST MAKES NO
14 FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, AND DATA ACCURACY. NIST
16 UNINTERRUPTED OR ERROR-FREE, OR THAT ANY DEFECTS WILL BE CORRECTED. NIST DOES
27 property. The software developed by NIST employees is not subject to copyright
H A DNIST-PD4 and Technology (NIST), and others. This software has been contributed to the
6 NIST employees are not subject to copyright protection in the United States and
10 This software is provided "AS IS." NIST MAKES NO WARRANTY OF ANY KIND, EXPRESS,
13 ACCURACY. NIST does not warrant or make any representations regarding the use
H A DNIST-PD-fallback3NIST), an agency of the Federal Government and is being made available as a public service. Pursua…
5 …, OR ANY WARRANTY THAT THE SOFTWARE WILL BE ERROR FREE. IN NO EVENT SHALL NIST BE LIABLE FOR ANY D…
/openbmc/openbmc/poky/meta/conf/distro/include/
H A Dcve-extra-exclusions.inc18 # strace https://nvd.nist.gov/vuln/detail/CVE-2000-0006
22 # epiphany https://nvd.nist.gov/vuln/detail/CVE-2005-0238
30 # glibc https://nvd.nist.gov/vuln/detail/CVE-2010-4756
37 # go https://nvd.nist.gov/vuln/detail/CVE-2020-29509
38 # go https://nvd.nist.gov/vuln/detail/CVE-2020-29511
68 # qemu:qemu-native:qemu-system-native https://nvd.nist.gov/vuln/detail/CVE-2021-20255
74 # qemu:qemu-native:qemu-system-native https://nvd.nist.gov/vuln/detail/CVE-2019-12067
80 # nasm:nasm-native https://nvd.nist.gov/vuln/detail/CVE-2020-18974
/openbmc/openbmc/meta-quanta/meta-gbs/recipes-bsp/images/npcm7xx-igps-native/
H A DBootBlockAndHeader_GBS.xml160 0x02: SECURITY_LEVEL_NIST. (require BootBlock with NIST support) -->
189 <!-- hole 0 size: used for NIST security. -->
200 <!-- hole 0: used for NIST security. -->
209 <!-- hole 0 size: used for NIST security. -->
219 <!-- hole 1: used for NIST security. -->
228 <!-- hole 1 size: used for NIST security. -->
239 <!-- hole 2: used for NIST security. -->
248 <!-- hole 2 size: used for NIST security. -->
258 <!-- hole 3: used for NIST security. -->
267 <!-- hole 3 size: used for NIST security. -->
/openbmc/docs/designs/
H A Dredfish-resource-supplement-for-pfr.md13 NIST SP 800-193 provides technical guidelines and recommendations supporting
27 Platform Firmware Resilience technology in NIST SP 800-93 provide common
35 - [NIST.SP.180-193](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-193.pdf)
51 Resilience by using guidelines provided by NIST SP 800-193. Some of the
/openbmc/qemu/tests/unit/
H A Dtest-crypto-cipher.c40 * http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf
44 /* NIST F.1.1 ECB-AES128.Encrypt */
61 /* NIST F.1.3 ECB-AES192.Encrypt */
78 /* NIST F.1.5 ECB-AES256.Encrypt */
97 /* NIST F.2.1 CBC-AES128.Encrypt */
115 /* NIST F.2.3 CBC-AES128.Encrypt */
133 /* NIST F.2.5 CBC-AES128.Encrypt */
538 /* NIST F.5.1 CTR-AES128.Encrypt */
556 /* NIST F.5.3 CTR-AES192.Encrypt */
574 /* NIST F.5.5 CTR-AES256.Encrypt */
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/
H A DKey_v1.xml103 <Annotation Term="OData.Description" String="NIST P-256."/>
107 <Annotation Term="OData.Description" String="NIST P-384."/>
111 <Annotation Term="OData.Description" String="NIST P-521."/>
115 <Annotation Term="OData.Description" String="NIST K-163."/>
119 <Annotation Term="OData.Description" String="NIST P-192."/>
123 <Annotation Term="OData.Description" String="NIST P-224."/>
127 <Annotation Term="OData.Description" String="NIST K-233."/>
131 <Annotation Term="OData.Description" String="NIST B-233."/>
135 <Annotation Term="OData.Description" String="NIST K-283."/>
139 <Annotation Term="OData.Description" String="NIST K-409."/>
[all …]
/openbmc/openbmc/poky/documentation/dev-manual/
H A Dvulnerabilities.rst91 "link": "https://nvd.nist.gov/vuln/detail/CVE-2006-0459",
104 "link": "https://nvd.nist.gov/vuln/detail/CVE-2016-6354",
117 "link": "https://nvd.nist.gov/vuln/detail/CVE-2019-6293",
154 upstream `NIST CVE database <https://nvd.nist.gov/>`__.
171 NVD about CVE entries can be provided through the `NVD contact form <https://nvd.nist.gov/info/cont…
301 Then, the code looks up all the CVE IDs in the NIST database for all the
325 - study the latest information in `CVE database <https://nvd.nist.gov/vuln/search>`__.
/openbmc/openbmc/poky/meta/recipes-core/glibc/
H A Dglibc_2.41.bb4 # glibc https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1010022
5 # glibc https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1010023
6 # glibc https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1010024
13 # glibc https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1010025
/openbmc/u-boot/include/u-boot/
H A Dsha1.h10 * The SHA-1 standard was published by NIST in 1993.
12 * http://www.itl.nist.gov/fipspubs/fip180-1.htm
/openbmc/phosphor-user-manager/
H A Dmeson.options16 description: 'Max password Length default value as per NIST guideline recommendation',
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/PFR/
H A DAttributes.interface.yaml3 recommended by NIST SP 800-193.
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-multimedia/audiofile/
H A Daudiofile_0.3.6.bb4 Research, Amiga IFF/8SVX, and NIST SPHERE."
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/libtar/files/
H A DCVE-2013-4420.patch6 Description of the vulnerability from the NIST CVE tracker [1]:
32 [1] https://nvd.nist.gov/vuln/detail/CVE-2013-4420
/openbmc/openbmc/poky/meta/recipes-core/meta/
H A Dcve-update-nvd2-native.bb17 NVDCVE_URL ?= "https://services.nvd.nist.gov/rest/json/cves/2.0"
19 # If you have a NVD API key (https://nvd.nist.gov/developers/request-an-api-key)
140 NVD API documentation: https://nvd.nist.gov/developers/vulnerabilities
H A Dcve-update-db-native.bb14 NVDCVE_URL ?= "https://nvd.nist.gov/feeds/json/cve/1.1/nvdcve-1.1-"
127 return "nvd.nist.gov"
/openbmc/qemu/tests/qtest/
H A Dnpcm7xx_rng-test.c87 * Perform a frequency (monobit) test, as defined by NIST SP 800-22, on the
116 * Perform a runs test, as defined by NIST SP 800-22, and return the P-value.
/openbmc/openbmc/meta-security/recipes-compliance/openscap/
H A Dopenscap_1.4.1.bb4 SUMARRY = "NIST Certified SCAP 1.2 toolkit"
/openbmc/openbmc/meta-security/recipes-security/ecryptfs-utils/files/
H A Decryptfs-utils-CVE-2016-6224.patch14 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6224
/openbmc/phosphor-time-manager/
H A DREADME.md88 - To set an NTP [server](https://tf.nist.gov/tf-cgi/servers.cgi):
/openbmc/openbmc/poky/scripts/
H A Dcve-json-to-text.py133 lines += "MORE INFORMATION: https://nvd.nist.gov/vuln/detail/%s\n" % issue["id"]
/openbmc/u-boot/board/freescale/ls1021atwr/
H A DREADME68 - True Random Number Generator (NIST Certified)
/openbmc/u-boot/board/freescale/ls1021aqds/
H A DREADME68 - True Random Number Generator (NIST Certified)
/openbmc/qemu/docs/system/devices/
H A Dcanokey.rst10 * PIV (NIST SP 800-73-4)

12