/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/links/ |
H A D | links-x11_2.26.bb | 19 --with-ssl=${STAGING_LIBDIR}/.. --with-libjpeg \
|
/openbmc/openbmc/meta-security/recipes-perl/perl/ |
H A D | libwhisker2-perl_2.5.bb | 19 PACKAGEGROUP[ssl] = ", , libnet-ssleay-perl, libnet-ssleay-perl"
|
/openbmc/openbmc/poky/meta/recipes-support/ca-certificates/ca-certificates/ |
H A D | 0003-update-ca-certificates-use-relative-symlinks-from-ET.patch | 14 passed the pem file in /etc/ssl/certs/ that was added or 54 ETCCERTSDIR=$SYSROOT/etc/ssl/certs
|
/openbmc/openbmc/poky/meta/recipes-support/ca-certificates/ |
H A D | ca-certificates_20211016.bb | 43 ${D}${sysconfdir}/ssl/certs \ 76 CONFFILES:${PN}:append:class-nativesdk = " ${sysconfdir}/ssl/certs/ca-certificates.crt"
|
/openbmc/openbmc/meta-security/recipes-security/libest/ |
H A D | libest_3.2.0.bb | 18 EXTRA_OECONF = "--disable-pthreads --with-ssl-dir=${STAGING_LIBDIR}"
|
/openbmc/linux/arch/xtensa/lib/ |
H A D | udivsi3.S | 20 ssl a4
|
H A D | modsi3.S | 21 ssl a4
|
H A D | divsi3.S | 21 ssl a4
|
/openbmc/qemu/python/tests/ |
H A D | protocol.py | 44 async def _do_start_server(self, address, ssl=None): argument 50 await super()._do_start_server(address, ssl) 58 async def _do_connect(self, address, ssl=None): argument 63 await super()._do_connect(address, ssl)
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-protocols/mdns/mdns/ |
H A D | 0009-remove-unneeded-headers.patch | 27 #include <mbedtls/ssl.h>
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/wireshark/ |
H A D | wireshark_4.2.4.bb | 28 PACKAGECONFIG:class-native = "libpcap gnutls ssl libssh" 36 PACKAGECONFIG[ssl] = ",,openssl"
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/openhpi/files/ |
H A D | openhpi-libxml2-cross-compile.patch | 20 @@ -179,7 +179,7 @@ AC_CHECK_HEADERS([openssl/md2.h openssl/md5.h openssl/bio.h openssl/ssl.h openss
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/lprng/ |
H A D | lprng_3.8.C.bb | 14 EXTRA_OECONF = "--disable-ssl --disable-kerberos --enable-force_localhost"
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/rabbitmq-c/files/ |
H A D | CVE-2023-35789.patch | 38 static char *amqp_cacert = "/etc/ssl/certs/cacert.pem"; 46 {"ssl", 0, POPT_ARG_NONE, &amqp_ssl, 0, "connect over SSL/TLS", NULL},
|
/openbmc/openbmc/meta-security/recipes-security/opendnssec/ |
H A D | opendnssec_2.1.10.bb | 18 --with-ssl=${STAGING_DIR_HOST}/usr "
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-m2crypto/ |
H A D | 0001-setup.py-link-in-sysroot-not-in-host-directories.patch | 18 self.libraries = ['ssl', 'crypto']
|
/openbmc/openbmc/poky/meta/recipes-support/curl/curl/ |
H A D | no-test-timeout.patch | 25 my %runcert; # cert file currently in use by an ssl running server
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/fetchmail/ |
H A D | fetchmail_6.4.38.bb | 19 EXTRA_OECONF = "--with-ssl=${STAGING_DIR_HOST}${prefix}"
|
/openbmc/bmcweb/http/routing/ |
H A D | baserule.hpp | 52 boost::asio::ssl::stream<boost::asio::ip::tcp::socket>&& /*adaptor*/) in handleUpgrade()
|
/openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/libnet/ |
H A D | libnet-ldap-perl_0.68.bb | 32 libio-socket-ssl-perl \
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/autofs/autofs/ |
H A D | fix_disable_ldap.patch | 34 #include <openssl/ssl.h>
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/websocketpp/websocketpp-0.8.2/ |
H A D | 0001-Correct-clang-compiler-flags.patch | 23 set (WEBSOCKETPP_PLATFORM_TLS_LIBS ssl crypto)
|
/openbmc/openbmc-test-automation/gui/test/access_control/ |
H A D | test_obmc_gui_certificate.robot | 15 ${xpath_select_certificate_management} //a[@href='#/access-control/ssl-certificates']
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/stunnel/ |
H A D | stunnel_5.72.bb | 24 EXTRA_OECONF += "--with-ssl='${STAGING_EXECPREFIXDIR}' --disable-fips"
|
/openbmc/bmcweb/http/ |
H A D | mutual_tls.hpp | 53 boost::asio::ssl::verify_context& ctx) in verifyMtlsUser()
|