Home
last modified time | relevance | path

Searched full:signer (Results 1 – 25 of 27) sorted by relevance

12

/openbmc/qemu/hw/uefi/
H A Dvar-service-pkcs7.c173 static int build_digest_authvar(gnutls_x509_crt_t signer, in build_digest_authvar() argument
184 /* get signer CN */ in build_digest_authvar()
185 rc = gnutls_x509_crt_get_dn_by_oid(signer, GNUTLS_OID_X520_COMMON_NAME, in build_digest_authvar()
194 rc = gnutls_x509_crt_get_dn_by_oid(signer, GNUTLS_OID_X520_COMMON_NAME, in build_digest_authvar()
244 * chain, and the subject CN of the signer certificate.
256 gnutls_x509_crt_t signer = NULL; in build_trust_list_authvar() local
263 /* first is signer certificate */ in build_trust_list_authvar()
270 rc = gnutls_x509_crt_init(&signer); in build_trust_list_authvar()
275 rc = gnutls_x509_crt_import(signer, &signer_data, GNUTLS_X509_FMT_DER); in build_trust_list_authvar()
279 gnutls_x509_crt_deinit(signer); in build_trust_list_authvar()
[all …]
/openbmc/openbmc/poky/meta/recipes-core/meta/
H A Dsigning-keys.bb28 signer = get_signer(d, d.getVar('RPM_GPG_BACKEND'))
29 signer.export_pubkey(os.path.join(d.expand('${B}'), 'rpm-key'),
34 signer = get_signer(d, d.getVar('IPK_GPG_BACKEND'))
35 signer.export_pubkey(os.path.join(d.expand('${B}'), 'ipk-key'),
40 signer = get_signer(d, d.getVar('PACKAGE_FEED_GPG_BACKEND'))
41 signer.export_pubkey(os.path.join(d.expand('${B}'), 'pf-key'),
/openbmc/u-boot/doc/uImage.FIT/
H A Dverified-boot.txt25 Images are signed using a private key known only to the signer, but can
46 | signer | * | U-Boot |
62 The public key from the signer allows us to verify and therefore trust
73 The above method works for a signer providing images to a run-time U-Boot.
76 1. Master private key is used by the signer to sign a first-stage image.
H A Dsignature.txt84 allow the signer to operate. These should be added to the .its file.
103 - signer-name: Name of the signer (e.g. "mkimage")
105 - signer-version: Version string of the signer (e.g. "2013.01")
107 - comment: Additional information about the signer or image
119 For config bindings, these properties are added by the signer:
121 - hashed-nodes: A list of nodes which were hashed by the signer. Each is
H A Dbeaglebone_vboot.txt397 signer-version
398 signer-name
/openbmc/openbmc/poky/meta/classes/
H A Dsign_ipk.bbclass51 signer = get_signer(d, d.getVar('IPK_GPG_BACKEND'))
55 signer.detach_sign(ipk_to_sign,
H A Dsign_rpm.bbclass62 signer = get_signer(d, d.getVar('RPM_GPG_BACKEND'))
65 signer.sign_rpms(rpms,
/openbmc/openbmc-tools/cla-signers/
H A DREADME.md1 # Greppable CLA signer list
/openbmc/openbmc/poky/meta/lib/oe/package_manager/rpm/
H A D__init__.py17 signer = get_signer(self.d, self.d.getVar('PACKAGE_FEED_GPG_BACKEND'))
19 signer = None
27 if signer:
30 signer.detach_sign(os.path.join(deploy_dir, 'repodata', 'repomd.xml'),
132 signer = get_signer(self.d, self.d.getVar('RPM_GPG_BACKEND'))
134 signer.export_pubkey(pubkey_path, self.d.getVar('RPM_GPG_NAME'))
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Attestation/
H A DMeasurementSet.interface.yaml49 signer.
/openbmc/openbmc/meta-security/recipes-security/opendnssec/
H A Dopendnssec_2.1.10.bb1 SUMMARY = "OpenDNSSEC is a policy-based zone signer that automates the process of keeping track of …
/openbmc/qemu/scripts/
H A Dget_maintainer.pl730 --roles => show roles (status:subsystem, git-signer, list, etc...)
1251 foreach my $signer (@signature_lines) {
1252 $signer = deduplicate_email($signer);
1538 if ($list[$i]->[1] =~ /^(author|commit|signer)/i);
1765 my $signer = $signers[0];
1767 $signer = deduplicate_email($signer);
1770 foreach my $ref(@{$commit_signer_hash{$signer}}) {
1779 push(@{$commit_signer_hash{$signer}},
1842 foreach my $signer (@signers) {
1843 $signer = deduplicate_email($signer);
[all …]
/openbmc/u-boot/scripts/
H A Dget_maintainer.pl1002 --roles => show roles (status:subsystem, git-signer, list, etc...)
1538 foreach my $signer (@signature_lines) {
1539 $signer = deduplicate_email($signer);
1844 if ($list[$i]->[1] =~ /^(author|commit|signer)/i);
2071 my $signer = $signers[0];
2073 $signer = deduplicate_email($signer);
2076 foreach my $ref(@{$commit_signer_hash{$signer}}) {
2085 push(@{$commit_signer_hash{$signer}},
2160 foreach my $signer (@signers) {
2161 $signer = deduplicate_email($signer);
[all …]
/openbmc/openbmc/poky/meta/lib/oe/package_manager/ipk/
H A D__init__.py22 signer = get_signer(self.d, self.d.getVar('PACKAGE_FEED_GPG_BACKEND'))
24 signer = None
57 if signer:
61 signer.detach_sign(f,
/openbmc/openbmc/poky/meta/lib/oe/package_manager/deb/
H A D__init__.py87 signer = get_signer(self.d, self.d.getVar('PACKAGE_FEED_GPG_BACKEND'))
89 signer = None
90 if signer:
92 signer.detach_sign(f,
/openbmc/u-boot/tools/
H A Dimage-host.c95 * This writes the signature and signer data to the FIT.
122 ret = fdt_setprop_string(fit, noffset, "signer-name", in fit_image_write_sig()
126 ret = fdt_setprop_string(fit, noffset, "signer-version", in fit_image_write_sig()
H A Dkwbimage.c635 ret = openssl_err("Signer setup failed"); in kwb_sign()
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/
H A D0001-Forward-port-to-OpenSSL-1.1.x.patch265 + X509 *signer = NULL;
266 + if (OCSP_resp_get0_signer(bs, &signer, NULL) == 1) {
267 + return WvX509(X509_dup(signer));
/openbmc/openbmc/poky/meta/lib/oe/
H A Dgpg_sign.py155 """Get signer object for the specified backend"""
/openbmc/u-boot/lib/rsa/
H A Drsa-sign.c437 ret = rsa_err("Signer setup failed"); in rsa_sign_with_key()
445 ret = rsa_err("Signer padding setup failed"); in rsa_sign_with_key()
/openbmc/openbmc/poky/meta/classes-global/
H A Dsstate.bbclass383 signer = get_signer(d, 'local')
384 if not signer.verify(sstatepkg + '.sig', d.getVar("SSTATE_VALID_SIGS")):
854 signer = get_signer(d, 'local')
855 signer.detach_sign(str(tmp_pkg), d.getVar('SSTATE_SIG_KEY'), None,
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema-installed/
H A DComponentIntegrity.v1_3_2.json464 … "description": "Base64-encoded cryptographic signed statement generated by the signer.",
1049 … "description": "The Base64-encoded cryptographic signed statement generated by the signer.",
1050 …dding characters, of the cryptographic signed statement generated by the signer. This value shall…
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/
H A DComponentIntegrity.v1_3_2.json464 … "description": "Base64-encoded cryptographic signed statement generated by the signer.",
1049 … "description": "The Base64-encoded cryptographic signed statement generated by the signer.",
1050 …dding characters, of the cryptographic signed statement generated by the signer. This value shall…
/openbmc/bmcweb/redfish-core/schema/dmtf/installed/
H A DComponentIntegrity_v1.xml532 <Annotation Term="OData.Description" String="Base64-encoded cryptographic signed statement generated by the signer."/>
681 <Annotation Term="OData.Description" String="The Base64-encoded cryptographic signed statement generated by the signer."/>
682 <Annotation Term="OData.LongDescription" String="This property shall contain a Base64-encoded string, with padding characters, of the cryptographic signed statement generated by the signer. This value shall be the concatenation of the 'quoted' and 'signature' response values of the 'TPM2_Quote' command defined in the Trusted Platform Module Library Specification."/>
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/
H A DComponentIntegrity_v1.xml532 …Data.Description" String="Base64-encoded cryptographic signed statement generated by the signer."/>
681 ….Description" String="The Base64-encoded cryptographic signed statement generated by the signer."/>
682 …dding characters, of the cryptographic signed statement generated by the signer. This value shall…

12