Home
last modified time | relevance | path

Searched full:signing (Results 1 – 25 of 170) sorted by relevance

1234567

/openbmc/openbmc/poky/meta/classes/
H A Dsign_package_feed.bbclass7 # Class for signing package feeds
12 # Path to a file containing the passphrase of the signing key.
16 # Optional variable for specifying the backend to use for signing.
17 # Currently the only available option is 'local', i.e. local signing
27 # signing.
38 # Make feed signing key to be present in rootfs
39 FEATURE_PACKAGES_package-management:append = " signing-keys-packagefeed"
52 do_package_index[depends] += "signing-keys:do_deploy"
53 do_rootfs[depends] += "signing-keys:do_populate_sysroot gnupg-native:do_populate_sysroot"
H A Dsign_rpm.bbclass11 # The passphrase of the signing key.
15 # Optional variable for specifying the backend to use for signing.
16 # Currently the only available option is 'local', i.e. local signing
22 # Optional variable for the file signing key.
24 # Optional variable for the file signing key password.
27 # signing.
75 do_package_index[depends] += "signing-keys:do_deploy"
76 do_rootfs[depends] += "signing-keys:do_populate_sysroot"
H A Dsign_ipk.bbclass11 # Path to a file containing the passphrase of the signing key.
15 # Optional variable for specifying the backend to use for signing.
16 # Currently the only available option is 'local', i.e. local signing
24 # signing.
49 bb.debug(1, 'Signing ipk: %s' % ipk_to_sign)
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/
H A DEntry.interface.yaml14 The current status of the signing operation.
19 Signing operation state enum.
23 Signing request is pending.
29 CSR signing complete
H A DAuthority.interface.yaml2 Signs Certificate Signing Request.
6 This method provides signing authority functionality.
12 Should be a valid PEM encoded Certificate signing request
H A DCertificate.interface.yaml33 CodeSigning: The public key is used for the signing of executable
54 protects against the signing entity falsely denying
56 OCSPSigning: The public key is used for signing OCSP responses.
/openbmc/openbmc/meta-openembedded/meta-oe/classes/
H A Dsigning.bbclass16 # Many software projects support signing using PKCS #11 keys, but configuring
18 # widespread, testing code signing in CI is not simple. To solve this at the
37 # meta-code-signing/recipes-security/signing-keys/dummy-rsa-key-native.bb
38 # meta-code-signing-demo/recipes-security/ptx-dev-keys/ptx-dev-keys-native_git.bb
40 # Examples for using keys for signing:
42 # meta-code-signing-demo/recipes-security/fit-image/linux-fit-image.bb
43 # meta-code-signing-demo/recipes-core/bundles/update-bundle.bb
47 # meta-code-signing-demo/recipes-security/fit-image/barebox_%.bbappend
48 # meta-code-signing-demo/recipes-core/rauc/rauc_%.bbappend
50 # Examples for using keys for both signing and authentication:
[all …]
/openbmc/u-boot/doc/
H A Dmkimage.1105 Specifies a comment to be added when signing. This is typically a useful
146 Specifies the directory containing keys to use for signing. This directory
147 should contain a private key file <name>.key for use with signing and a
190 /public/signing-keys directory. Add corresponding public keys into u-boot.dtb,
193 .B mkimage -f kernel.its -k /public/signing-keys -K u-boot.dtb \\\\
199 Update an existing FIT image, signing it with additional keys.
201 with keys that are available in the new directory. Images that request signing
204 .B mkimage -F -k /secret/signing-keys -K u-boot.dtb \\\\
232 and Wolfgang Denk <wd@denx.de>. It was updated for image signing by
/openbmc/openbmc/meta-hpe/meta-gxp/classes/
H A Dgxp2-bootblock-n.bbclass1 # TODO: Manually copy the U-Boot signing key here:
16 # Copy in the U-Boot signing key
17 …install -m 644 ${HPE_GXP_KEY_FILES_DIR}/customer_private_key.pem ${DEPLOYDIR}/hpe-uboot-signing-ke…
H A Dgxp-bootblock-n.bbclass1 # TODO: Manually copy the U-Boot signing key and customer-key-block here:
15 # Copy in the U-Boot signing key
16 install -m 644 ${HPE_GXP_KEY_FILES_DIR}/private_key.pem ${DEPLOYDIR}/hpe-uboot-signing-key.pem
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/CSR/
H A DCreate.interface.yaml2 Implement to create Certificate Signing Request(CSR).
7 This command is used to initiate a certificate signing request. This
81 The type of key pair for use with signing algorithms.
95 CodeSigning: The public key is used for the signing of
123 protects against the signing entity falsely
126 OCSPSigning: The public key is used for signing OCSP responses.
/openbmc/openbmc/meta-security/meta-integrity/classes/
H A Dima-evm-rootfs.bbclass7 # Private key for IMA signing. The default is okay when
11 # Additional option when signing. Allows to for example provide
49 # reasons (including a change of the signing keys) without also
84 bbnote "IMA/EVM: Signing root filesystem at ${IMAGE_ROOTFS} with key ${IMA_EVM_PRIVKEY}"
88 # check signing key and signature verification key
100 bbnote "IMA/EVM: Signing IMA policy with key ${IMA_EVM_PRIVKEY}"
118 # Signing must run as late as possible in the do_rootfs task.
H A Dkernel-modsign.bbclass7 # Private key for modules signing. The default is okay when
11 # Public part of certificates used for modules signing.
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/imx-cst/
H A Dimx-cst_3.4.0.bb1 SUMMARY = "i.MX code signing tool"
2 DESCRIPTION = "Code signing support that integrates the HABv4 and AHAB library for i.MX processors"
14 DEBIAN_PGK_NAME = "imx-code-signing-tool"
/openbmc/u-boot/doc/uImage.FIT/
H A Dsignature.txt22 The procedure for signing is as follows:
37 The signing is generally performed by mkimage, as part of making a firmware
90 - key-name-hint: Name of key to use for signing. The keys will normally be in
132 sign-configs.its for config signing.
149 - key-name-hint: Name of key used for signing. This is only a hint since it
151 all available signing keys until one matches.
160 Each signing algorithm has its own additional properties.
173 While signing images is useful, it does not provide complete protection
333 CONFIG_FIT_SIGNATURE - enable signing and verification in FITs
334 CONFIG_RSA - enable RSA algorithm for signing
[all …]
/openbmc/openbmc/poky/meta/recipes-core/meta/
H A Dsigning-keys.bb4 SUMMARY = "Makes public keys of the signing keys available"
27 # Export public key of the rpm signing key
33 # Export public key of the ipk signing key
39 # Export public key of the feed signing key
/openbmc/openbmc/poky/meta/recipes-devtools/file/files/
H A D0001-Use-4-in-default-reset-previous-negative-offset-in-m.patch26 >>>>>>(-6.l-16) string APK\x20Sig\x20Block\x2042 \b, with APK Signing Block
46 +# APK Signing Block
57 -# APK Signing Block
60 ->>>(-6.l-16) string APK\x20Sig\x20Block\x2042 Android package (APK), with APK Signing Block
63 +>>>>>(-6.l-16) string APK\x20Sig\x20Block\x2042 Android package (APK), with APK Signing Block
/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/trusted-firmware-m/
H A Dtrusted-firmware-m-scripts-native.inc1 SUMMARY = "Trusted Firmware image signing scripts"
2 DESCRIPTION = "Trusted Firmware-M image signing scripts"
/openbmc/openbmc/meta-arm/meta-arm/classes/
H A Dtfm_sign_image.bbclass6 # * Write the signing logic, which may call the function sign_host_image,
38 # The arguments passed to the TF-M image signing script. Override this variable
65 # $4 ... signing private key's path
/openbmc/openbmc/meta-phosphor/recipes-phosphor/flash/files/
H A DOpenBMC.priv7 signing keys should be used, and the private production signing key should be
/openbmc/openbmc/meta-security/meta-integrity/
H A DREADME.md90 the image, enable image signing in the local.conf like this:
99 IMA_EVM_PRIVKEY_KEYID_OPT = "<options to use while signing>"
128 # Signing images then will not require entering that passphrase,
140 and sign the signing keys with it. The ``ima-evm-rootfs.bbclass`` then
240 * Signing files in advance with a X509 certificate and then not having
243 * EVM signing in advance would only work on the final file system and thus
/openbmc/openbmc/poky/meta/lib/oe/
H A Dgpg_sign.py7 """Helper module for GPG signing"""
16 """Class for handling local (on the build host) signing"""
156 # Use local signing by default
160 bb.fatal("Unsupported signing backend '%s'" % backend)
/openbmc/u-boot/arch/arm/mach-tegra/tegra20/
H A Dcrypto.c110 * The only need for a key is for signing/checksum purposes, so in encrypt_and_sign()
127 debug("encrypt_and_sign: begin signing\n"); in encrypt_and_sign()
129 debug("encrypt_and_sign: end signing\n"); in encrypt_and_sign()
/openbmc/openbmc/meta-phosphor/recipes-phosphor/flash/
H A Dphosphor-image-signing.bb1 SUMMARY = "OpenBMC image signing public key"
6 DEPENDS += "${@oe.utils.conditional('INSECURE_KEY', 'True', 'phosphor-insecure-signing-key-native',…
/openbmc/openbmc/poky/meta/conf/
H A Dimage-fitimage.conf2 # related to signing of the fitImage content.
16 # Generate keys for signing Kernel fitImage

1234567