/openbmc/qemu/hw/uefi/ |
H A D | var-service-pkcs7.c | 173 static int build_digest_authvar(gnutls_x509_crt_t signer, in build_digest_authvar() argument 184 /* get signer CN */ in build_digest_authvar() 185 rc = gnutls_x509_crt_get_dn_by_oid(signer, GNUTLS_OID_X520_COMMON_NAME, in build_digest_authvar() 194 rc = gnutls_x509_crt_get_dn_by_oid(signer, GNUTLS_OID_X520_COMMON_NAME, in build_digest_authvar() 244 * chain, and the subject CN of the signer certificate. 256 gnutls_x509_crt_t signer = NULL; in build_trust_list_authvar() local 263 /* first is signer certificate */ in build_trust_list_authvar() 270 rc = gnutls_x509_crt_init(&signer); in build_trust_list_authvar() 275 rc = gnutls_x509_crt_import(signer, &signer_data, GNUTLS_X509_FMT_DER); in build_trust_list_authvar() 279 gnutls_x509_crt_deinit(signer); in build_trust_list_authvar() [all …]
|
/openbmc/openbmc/poky/meta/recipes-core/meta/ |
H A D | signing-keys.bb | 28 signer = get_signer(d, d.getVar('RPM_GPG_BACKEND')) 29 signer.export_pubkey(os.path.join(d.expand('${B}'), 'rpm-key'), 34 signer = get_signer(d, d.getVar('IPK_GPG_BACKEND')) 35 signer.export_pubkey(os.path.join(d.expand('${B}'), 'ipk-key'), 40 signer = get_signer(d, d.getVar('PACKAGE_FEED_GPG_BACKEND')) 41 signer.export_pubkey(os.path.join(d.expand('${B}'), 'pf-key'),
|
/openbmc/u-boot/doc/uImage.FIT/ |
H A D | verified-boot.txt | 25 Images are signed using a private key known only to the signer, but can 46 | signer | * | U-Boot | 62 The public key from the signer allows us to verify and therefore trust 73 The above method works for a signer providing images to a run-time U-Boot. 76 1. Master private key is used by the signer to sign a first-stage image.
|
H A D | signature.txt | 84 allow the signer to operate. These should be added to the .its file. 103 - signer-name: Name of the signer (e.g. "mkimage") 105 - signer-version: Version string of the signer (e.g. "2013.01") 107 - comment: Additional information about the signer or image 119 For config bindings, these properties are added by the signer: 121 - hashed-nodes: A list of nodes which were hashed by the signer. Each is
|
H A D | beaglebone_vboot.txt | 397 signer-version 398 signer-name
|
/openbmc/openbmc/poky/meta/classes/ |
H A D | sign_ipk.bbclass | 51 signer = get_signer(d, d.getVar('IPK_GPG_BACKEND')) 55 signer.detach_sign(ipk_to_sign,
|
H A D | sign_rpm.bbclass | 62 signer = get_signer(d, d.getVar('RPM_GPG_BACKEND')) 65 signer.sign_rpms(rpms,
|
/openbmc/openbmc-tools/cla-signers/ |
H A D | README.md | 1 # Greppable CLA signer list
|
/openbmc/openbmc/poky/meta/lib/oe/package_manager/rpm/ |
H A D | __init__.py | 17 signer = get_signer(self.d, self.d.getVar('PACKAGE_FEED_GPG_BACKEND')) 19 signer = None 27 if signer: 30 signer.detach_sign(os.path.join(deploy_dir, 'repodata', 'repomd.xml'), 132 signer = get_signer(self.d, self.d.getVar('RPM_GPG_BACKEND')) 134 signer.export_pubkey(pubkey_path, self.d.getVar('RPM_GPG_NAME'))
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Attestation/ |
H A D | MeasurementSet.interface.yaml | 49 signer.
|
/openbmc/openbmc/meta-security/recipes-security/opendnssec/ |
H A D | opendnssec_2.1.10.bb | 1 SUMMARY = "OpenDNSSEC is a policy-based zone signer that automates the process of keeping track of …
|
/openbmc/qemu/scripts/ |
H A D | get_maintainer.pl | 730 --roles => show roles (status:subsystem, git-signer, list, etc...) 1251 foreach my $signer (@signature_lines) { 1252 $signer = deduplicate_email($signer); 1538 if ($list[$i]->[1] =~ /^(author|commit|signer)/i); 1765 my $signer = $signers[0]; 1767 $signer = deduplicate_email($signer); 1770 foreach my $ref(@{$commit_signer_hash{$signer}}) { 1779 push(@{$commit_signer_hash{$signer}}, 1842 foreach my $signer (@signers) { 1843 $signer = deduplicate_email($signer); [all …]
|
/openbmc/u-boot/scripts/ |
H A D | get_maintainer.pl | 1002 --roles => show roles (status:subsystem, git-signer, list, etc...) 1538 foreach my $signer (@signature_lines) { 1539 $signer = deduplicate_email($signer); 1844 if ($list[$i]->[1] =~ /^(author|commit|signer)/i); 2071 my $signer = $signers[0]; 2073 $signer = deduplicate_email($signer); 2076 foreach my $ref(@{$commit_signer_hash{$signer}}) { 2085 push(@{$commit_signer_hash{$signer}}, 2160 foreach my $signer (@signers) { 2161 $signer = deduplicate_email($signer); [all …]
|
/openbmc/openbmc/poky/meta/lib/oe/package_manager/ipk/ |
H A D | __init__.py | 22 signer = get_signer(self.d, self.d.getVar('PACKAGE_FEED_GPG_BACKEND')) 24 signer = None 57 if signer: 61 signer.detach_sign(f,
|
/openbmc/openbmc/poky/meta/lib/oe/package_manager/deb/ |
H A D | __init__.py | 87 signer = get_signer(self.d, self.d.getVar('PACKAGE_FEED_GPG_BACKEND')) 89 signer = None 90 if signer: 92 signer.detach_sign(f,
|
/openbmc/u-boot/tools/ |
H A D | image-host.c | 95 * This writes the signature and signer data to the FIT. 122 ret = fdt_setprop_string(fit, noffset, "signer-name", in fit_image_write_sig() 126 ret = fdt_setprop_string(fit, noffset, "signer-version", in fit_image_write_sig()
|
H A D | kwbimage.c | 635 ret = openssl_err("Signer setup failed"); in kwb_sign()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/ |
H A D | 0001-Forward-port-to-OpenSSL-1.1.x.patch | 265 + X509 *signer = NULL; 266 + if (OCSP_resp_get0_signer(bs, &signer, NULL) == 1) { 267 + return WvX509(X509_dup(signer));
|
/openbmc/openbmc/poky/meta/lib/oe/ |
H A D | gpg_sign.py | 155 """Get signer object for the specified backend"""
|
/openbmc/u-boot/lib/rsa/ |
H A D | rsa-sign.c | 437 ret = rsa_err("Signer setup failed"); in rsa_sign_with_key() 445 ret = rsa_err("Signer padding setup failed"); in rsa_sign_with_key()
|
/openbmc/openbmc/poky/meta/classes-global/ |
H A D | sstate.bbclass | 383 signer = get_signer(d, 'local') 384 if not signer.verify(sstatepkg + '.sig', d.getVar("SSTATE_VALID_SIGS")): 854 signer = get_signer(d, 'local') 855 signer.detach_sign(str(tmp_pkg), d.getVar('SSTATE_SIG_KEY'), None,
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema-installed/ |
H A D | ComponentIntegrity.v1_3_2.json | 464 … "description": "Base64-encoded cryptographic signed statement generated by the signer.", 1049 … "description": "The Base64-encoded cryptographic signed statement generated by the signer.", 1050 …dding characters, of the cryptographic signed statement generated by the signer. This value shall…
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
H A D | ComponentIntegrity.v1_3_2.json | 464 … "description": "Base64-encoded cryptographic signed statement generated by the signer.", 1049 … "description": "The Base64-encoded cryptographic signed statement generated by the signer.", 1050 …dding characters, of the cryptographic signed statement generated by the signer. This value shall…
|
/openbmc/bmcweb/redfish-core/schema/dmtf/installed/ |
H A D | ComponentIntegrity_v1.xml | 532 <Annotation Term="OData.Description" String="Base64-encoded cryptographic signed statement generated by the signer."/> 681 <Annotation Term="OData.Description" String="The Base64-encoded cryptographic signed statement generated by the signer."/> 682 <Annotation Term="OData.LongDescription" String="This property shall contain a Base64-encoded string, with padding characters, of the cryptographic signed statement generated by the signer. This value shall be the concatenation of the 'quoted' and 'signature' response values of the 'TPM2_Quote' command defined in the Trusted Platform Module Library Specification."/>
|
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/ |
H A D | ComponentIntegrity_v1.xml | 532 …Data.Description" String="Base64-encoded cryptographic signed statement generated by the signer."/> 681 ….Description" String="The Base64-encoded cryptographic signed statement generated by the signer."/> 682 …dding characters, of the cryptographic signed statement generated by the signer. This value shall…
|