/openbmc/openbmc/poky/scripts/lib/checklayer/cases/ |
H A D | bsp.py | 73 # Collect signatures for all machines that we are testing 79 # signatures do not agree on how to execute the task. 152 signatures = tasks[task] 154 # different signatures in some cases, for example in 161 if len(signatures.keys()) > 1 and \ 165 # Sort signatures by machines, because the hex values don't mean anything. 170 next_line_key = (pn, sorted(signatures.values())) 173 … line += ' != '.join(['%s (%s)' % (signature, ', '.join([m for m in signatures[signature]])) for 174 … signature in sorted(signatures.keys(), key=lambda s: signatures[s])]) 177 # Randomly pick two mismatched signatures and remember how to invoke [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/ |
H A D | Certificate.interface.yaml | 34 code. CRLSigning: The public key is used for verifying signatures on 42 signatures, other than signatures on certificates 47 KeyCertSign: The public key is used for verifying signatures on 51 NonRepudiation: The public key is used to verify digital signatures, 52 other than signatures on certificates and CRLs,
|
/openbmc/libcper/generator/sections/ |
H A D | gen-section-nvidia.c | 20 const char *signatures[] = { in generate_section_nvidia() local 48 cper_rand() % (sizeof(signatures) / sizeof(signatures[0])); in generate_section_nvidia() 49 strncpy(nvidia_error->Signature, signatures[idx_random], in generate_section_nvidia()
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/CSR/ |
H A D | Create.interface.yaml | 97 verifying signatures on 107 signatures, other than signatures on 113 KeyCertSign: The public key is used for verifying signatures on 119 signatures, 120 other than signatures on certificates and CRLs,
|
/openbmc/openbmc/poky/documentation/dev-manual/ |
H A D | bblock.rst | 9 Then, it compares these signatures with the ones from the sstate cache (if they 20 specific signatures, forcing BitBake to use the sstate cache for them. 28 with caution. If you do not understand why signatures change, see the section 75 ``bblock`` will dump the signatures in the ``build/conf/bblock.conf`` file, 98 have locked signatures.
|
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm2/tpm2-tss-engine/ |
H A D | tpm2-tss-engine_1.2.0.bb | 2 …or downwards communication. It supports RSA decryption and signatures as well as ECDSA signatures." 13 file://0002-Fix-mismatch-of-OpenSSL-function-signatures-that-cau.patch \
|
/openbmc/openbmc/poky/scripts/ |
H A D | sstate-diff-machines.sh | 142 …rintf "\n\n === Comparing signatures for task ${TASK} between ${MACHINE1} and ${MACHINE2} ===\n" |… 143 …}/list.M | grep ${PRE_PATTERN} "${PATTERN}" | grep ${TASK} > ${OUTPUT}/signatures.${MACHINE2}.${TA… 144 …for i in `cat ${OUTPUT}/signatures.${MACHINE2}.${TASK} | sed 's#[^/]*/\([^/]*\)/.*#\1#g' | sort -u… 153 done | tee -a ${OUTPUT}/signatures.${MACHINE2}.${TASK}.log 155 ERRORS=`grep "^ERROR.*" ${OUTPUT}/signatures.${MACHINE2}.${TASK}.log | wc -l` 157 echo "ERROR: ${ERRORS} errors found in ${OUTPUT}/signatures.${MACHINE2}.${TASK}.log"
|
H A D | buildhistory-diff | 47 parser.add_argument('-s', '---signatures', 51 help="Report list of signatures differing instead of output") 52 parser.add_argument('-S', '--signatures-with-diff',
|
H A D | yocto-check-layer | 69 help='check that software layers do not change signatures (on by default)') 178 …logger.info("%s already in %s. To capture initial signatures, layer under test should not present " 211 logger.info('Getting initial signatures ...') 218 results_status[layer['name']] = 'FAIL (Generating world signatures)'
|
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/ |
H A D | SignatureCollection_v1.xml | 42 …<Annotation Term="OData.Description" String="Signatures can be installed through a `POST` to the s… 57 …dfish/v1/Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures</String> 58 …BlockId}/Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures</String> 59 …BlockId}/Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures</String>
|
H A D | Signature_v1.xml | 49 … <Annotation Term="OData.Description" String="Use the `DELETE` operation to remove signatures."/> 54 …Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures/{SignatureId}</S… 55 …Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures/{SignatureId}</S… 56 …Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures/{SignatureId}</S…
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
H A D | SignatureCollection.json | 93 … "/redfish/v1/Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures", 94 …esourceBlockId}/Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures", 95 …ResourceBlockId}/Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures"
|
/openbmc/openbmc/poky/meta/recipes-extended/zip/zip-3.0/ |
H A D | 0001-configure-Include-dirent.h-for-closedir-opendir-APIs.patch | 11 without including signatures, it fails to build the test 12 due to missing signatures which come from dirent.h
|
/openbmc/openpower-hw-diags/analyzer/plugins/ |
H A D | ody-plugins.cpp | 35 // Copy all signatures PLL signatures that match the node ID and parent in pll_unlock()
|
/openbmc/phosphor-certificate-manager/ |
H A D | certs_manager.hpp | 149 * - CRLSigning: The public key is used for verifying signatures on 157 * signatures, other than signatures on certificatesand CRLs. 161 * - KeyCertSign: The public key is used for verifying signatures on 166 * signatures, other than signatures on certificates and CRLs, and
|
/openbmc/openbmc/poky/meta/recipes-devtools/make/ |
H A D | make_4.4.1.bb | 7 file://0001-Fix-signatures-for-getenv-getopt.patch \
|
/openbmc/openbmc/meta-security/meta-integrity/classes/ |
H A D | ima-evm-rootfs.bbclass | 18 # Whether to create IMA signatures (--imasig) or hashes (--imahash). 19 # Hashes are sufficient for IMA when EVM uses signatures. 105 # Optionally write the file names and ima and evm signatures into files
|
H A D | kernel-modsign.bbclass | 15 # If this class is enabled, disable stripping signatures from modules
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/ |
H A D | python3-pyhsslms_2.0.0.bb | 1 SUMMARY = "Pure-Python implementation of HSS/LMS Digital Signatures (RFC 8554)"
|
/openbmc/openbmc/meta-security/meta-integrity/data/debug-keys/ |
H A D | README.md | 8 - x509_ima.der: Certificate containing public key (of privkey_ima.pem) to verify signatures
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/fbset/ |
H A D | fbset-modes.bb | 19 # to disable "all" behavior (found when comparing qemuarm and qemux86 signatures)
|
/openbmc/docs/architecture/code-update/ |
H A D | code-update-diagrams.md | 37 │ │ signatures
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/libfido2/ |
H A D | libfido2_1.16.0.bb | 4 assertion signatures."
|
/openbmc/openpower-hw-diags/analyzer/ras-data/schema/ |
H A D | ras-data-schema-v02.json | 31 "required": ["model_ec", "version", "actions", "signatures"], 251 "signatures": { object
|
/openbmc/u-boot/Documentation/sphinx/ |
H A D | cdomain.py | 30 * Handle signatures of function-like macros well. Don't try to deduce 69 u"""Handles signatures of function-like macros.
|