/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | NIST-Software | 1 NIST-developed software is provided by NIST as a public service. 11 NIST-developed software is expressly provided "AS IS." NIST MAKES NO 14 FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, AND DATA ACCURACY. NIST 16 UNINTERRUPTED OR ERROR-FREE, OR THAT ANY DEFECTS WILL BE CORRECTED. NIST DOES 27 property. The software developed by NIST employees is not subject to copyright
|
H A D | NIST-PD | 4 and Technology (NIST), and others. This software has been contributed to the 6 NIST employees are not subject to copyright protection in the United States and 10 This software is provided "AS IS." NIST MAKES NO WARRANTY OF ANY KIND, EXPRESS, 13 ACCURACY. NIST does not warrant or make any representations regarding the use
|
H A D | NIST-PD-fallback | 3 …NIST), an agency of the Federal Government and is being made available as a public service. Pursua… 5 …, OR ANY WARRANTY THAT THE SOFTWARE WILL BE ERROR FREE. IN NO EVENT SHALL NIST BE LIABLE FOR ANY D…
|
/openbmc/openbmc/poky/meta/conf/distro/include/ |
H A D | cve-extra-exclusions.inc | 18 # strace https://nvd.nist.gov/vuln/detail/CVE-2000-0006 22 # epiphany https://nvd.nist.gov/vuln/detail/CVE-2005-0238 30 # glibc https://nvd.nist.gov/vuln/detail/CVE-2010-4756 37 # go https://nvd.nist.gov/vuln/detail/CVE-2020-29509 38 # go https://nvd.nist.gov/vuln/detail/CVE-2020-29511 68 # qemu:qemu-native:qemu-system-native https://nvd.nist.gov/vuln/detail/CVE-2021-20255 74 # qemu:qemu-native:qemu-system-native https://nvd.nist.gov/vuln/detail/CVE-2019-12067 80 # nasm:nasm-native https://nvd.nist.gov/vuln/detail/CVE-2020-18974
|
/openbmc/openbmc/meta-quanta/meta-gbs/recipes-bsp/images/npcm7xx-igps-native/ |
H A D | BootBlockAndHeader_GBS.xml | 160 0x02: SECURITY_LEVEL_NIST. (require BootBlock with NIST support) --> 189 <!-- hole 0 size: used for NIST security. --> 200 <!-- hole 0: used for NIST security. --> 209 <!-- hole 0 size: used for NIST security. --> 219 <!-- hole 1: used for NIST security. --> 228 <!-- hole 1 size: used for NIST security. --> 239 <!-- hole 2: used for NIST security. --> 248 <!-- hole 2 size: used for NIST security. --> 258 <!-- hole 3: used for NIST security. --> 267 <!-- hole 3 size: used for NIST security. -->
|
/openbmc/docs/designs/ |
H A D | redfish-resource-supplement-for-pfr.md | 13 NIST SP 800-193 provides technical guidelines and recommendations supporting 27 Platform Firmware Resilience technology in NIST SP 800-93 provide common 35 - [NIST.SP.180-193](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-193.pdf) 51 Resilience by using guidelines provided by NIST SP 800-193. Some of the
|
/openbmc/qemu/tests/unit/ |
H A D | test-crypto-cipher.c | 40 * http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf 44 /* NIST F.1.1 ECB-AES128.Encrypt */ 61 /* NIST F.1.3 ECB-AES192.Encrypt */ 78 /* NIST F.1.5 ECB-AES256.Encrypt */ 97 /* NIST F.2.1 CBC-AES128.Encrypt */ 115 /* NIST F.2.3 CBC-AES128.Encrypt */ 133 /* NIST F.2.5 CBC-AES128.Encrypt */ 538 /* NIST F.5.1 CTR-AES128.Encrypt */ 556 /* NIST F.5.3 CTR-AES192.Encrypt */ 574 /* NIST F.5.5 CTR-AES256.Encrypt */
|
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/ |
H A D | Key_v1.xml | 103 <Annotation Term="OData.Description" String="NIST P-256."/> 107 <Annotation Term="OData.Description" String="NIST P-384."/> 111 <Annotation Term="OData.Description" String="NIST P-521."/> 115 <Annotation Term="OData.Description" String="NIST K-163."/> 119 <Annotation Term="OData.Description" String="NIST P-192."/> 123 <Annotation Term="OData.Description" String="NIST P-224."/> 127 <Annotation Term="OData.Description" String="NIST K-233."/> 131 <Annotation Term="OData.Description" String="NIST B-233."/> 135 <Annotation Term="OData.Description" String="NIST K-283."/> 139 <Annotation Term="OData.Description" String="NIST K-409."/> [all …]
|
/openbmc/openbmc/poky/documentation/dev-manual/ |
H A D | vulnerabilities.rst | 91 "link": "https://nvd.nist.gov/vuln/detail/CVE-2006-0459", 104 "link": "https://nvd.nist.gov/vuln/detail/CVE-2016-6354", 117 "link": "https://nvd.nist.gov/vuln/detail/CVE-2019-6293", 154 upstream `NIST CVE database <https://nvd.nist.gov/>`__. 171 NVD about CVE entries can be provided through the `NVD contact form <https://nvd.nist.gov/info/cont… 301 Then, the code looks up all the CVE IDs in the NIST database for all the 325 - study the latest information in `CVE database <https://nvd.nist.gov/vuln/search>`__.
|
/openbmc/openbmc/poky/meta/recipes-core/glibc/ |
H A D | glibc_2.41.bb | 4 # glibc https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1010022 5 # glibc https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1010023 6 # glibc https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1010024 13 # glibc https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1010025
|
/openbmc/u-boot/include/u-boot/ |
H A D | sha1.h | 10 * The SHA-1 standard was published by NIST in 1993. 12 * http://www.itl.nist.gov/fipspubs/fip180-1.htm
|
/openbmc/phosphor-user-manager/ |
H A D | meson.options | 16 description: 'Max password Length default value as per NIST guideline recommendation',
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/PFR/ |
H A D | Attributes.interface.yaml | 3 recommended by NIST SP 800-193.
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-multimedia/audiofile/ |
H A D | audiofile_0.3.6.bb | 4 Research, Amiga IFF/8SVX, and NIST SPHERE."
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/libtar/files/ |
H A D | CVE-2013-4420.patch | 6 Description of the vulnerability from the NIST CVE tracker [1]: 32 [1] https://nvd.nist.gov/vuln/detail/CVE-2013-4420
|
/openbmc/openbmc/poky/meta/recipes-core/meta/ |
H A D | cve-update-nvd2-native.bb | 17 NVDCVE_URL ?= "https://services.nvd.nist.gov/rest/json/cves/2.0" 19 # If you have a NVD API key (https://nvd.nist.gov/developers/request-an-api-key) 140 NVD API documentation: https://nvd.nist.gov/developers/vulnerabilities
|
H A D | cve-update-db-native.bb | 14 NVDCVE_URL ?= "https://nvd.nist.gov/feeds/json/cve/1.1/nvdcve-1.1-" 127 return "nvd.nist.gov"
|
/openbmc/qemu/tests/qtest/ |
H A D | npcm7xx_rng-test.c | 87 * Perform a frequency (monobit) test, as defined by NIST SP 800-22, on the 116 * Perform a runs test, as defined by NIST SP 800-22, and return the P-value.
|
/openbmc/openbmc/meta-security/recipes-compliance/openscap/ |
H A D | openscap_1.4.1.bb | 4 SUMARRY = "NIST Certified SCAP 1.2 toolkit"
|
/openbmc/openbmc/meta-security/recipes-security/ecryptfs-utils/files/ |
H A D | ecryptfs-utils-CVE-2016-6224.patch | 14 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6224
|
/openbmc/phosphor-time-manager/ |
H A D | README.md | 88 - To set an NTP [server](https://tf.nist.gov/tf-cgi/servers.cgi):
|
/openbmc/openbmc/poky/scripts/ |
H A D | cve-json-to-text.py | 133 lines += "MORE INFORMATION: https://nvd.nist.gov/vuln/detail/%s\n" % issue["id"]
|
/openbmc/u-boot/board/freescale/ls1021atwr/ |
H A D | README | 68 - True Random Number Generator (NIST Certified)
|
/openbmc/u-boot/board/freescale/ls1021aqds/ |
H A D | README | 68 - True Random Number Generator (NIST Certified)
|
/openbmc/qemu/docs/system/devices/ |
H A D | canokey.rst | 10 * PIV (NIST SP 800-73-4)
|