Home
last modified time | relevance | path

Searched refs:Signing (Results 1 – 24 of 24) sorted by relevance

/openbmc/openbmc/poky/meta/recipes-devtools/file/files/
H A D0001-Use-4-in-default-reset-previous-negative-offset-in-m.patch26 >>>>>>(-6.l-16) string APK\x20Sig\x20Block\x2042 \b, with APK Signing Block
46 +# APK Signing Block
57 -# APK Signing Block
60 ->>>(-6.l-16) string APK\x20Sig\x20Block\x2042 Android package (APK), with APK Signing Block
63 +>>>>>(-6.l-16) string APK\x20Sig\x20Block\x2042 Android package (APK), with APK Signing Block
/openbmc/openbmc/meta-arm/meta-arm/classes/
H A Dsbsign.bbclass23 bbnote "Signing ${PN} binary ${SBSIGN_TARGET_BINARY} with ${SBSIGN_KEY} and ${SBSIGN_CERT}"
/openbmc/openbmc/meta-security/meta-integrity/classes/
H A Dima-evm-rootfs.bbclass84 bbnote "IMA/EVM: Signing root filesystem at ${IMAGE_ROOTFS} with key ${IMA_EVM_PRIVKEY}"
100 bbnote "IMA/EVM: Signing IMA policy with key ${IMA_EVM_PRIVKEY}"
118 # Signing must run as late as possible in the do_rootfs task.
/openbmc/u-boot/doc/imx/habv4/
H A Dintroduction_habv4.txt64 authentication process, this is generated by the Code Signing Tool[1].
68 Details about the Secure Boot and Code Signing Tool (CST) can be found in
123 The Code Signing Tool automatically generates a random AES Data Encryption Key
149 The Code Signing Tools package contains an OpenSSL based key generation script
259 [1] CST: i.MX High Assurance Boot Reference Code Signing Tool.
/openbmc/u-boot/doc/uImage.FIT/
H A Dverified-boot.txt22 Signing
34 Signing Verification
H A Dsignature.txt391 Hardware Signing with PKCS#11
/openbmc/openbmc/poky/meta/classes/
H A Dsign_ipk.bbclass49 bb.debug(1, 'Signing ipk: %s' % ipk_to_sign)
/openbmc/u-boot/doc/imx/habv4/guides/
H A Dencrypted_boot.txt4 Encrypted Boot. The image is encrypted by i.MX Code Signing
H A Dmx6_mx7_secure_boot.txt113 1.4 Signing the U-Boot binary
369 2.3 Signing the image
H A Dmx6_mx7_spl_secure_boot.txt145 1.4 Signing the images
/openbmc/openbmc/poky/meta/lib/oeqa/selftest/cases/
H A Dsigning.py19 class Signing(OESelftestTestCase): class
/openbmc/openbmc/meta-security/meta-integrity/
H A DREADME.md128 # Signing images then will not require entering that passphrase,
240 * Signing files in advance with a X509 certificate and then not having
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/
H A Dtest_certificates_sub_menu.robot19 ${xpath_generate_csr_heading} //h5[contains(text(), "Generate a Certificate Signing Request")]
/openbmc/u-boot/doc/imx/mkimage/
H A Dimximage.txt107 Freescale Code Signing Tool, available on the
/openbmc/docs/designs/management-console/
H A DVMI_Certificate_Exchange.md159 - Certificate Signing Request CSR is a message sent from an applicant to a
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/
H A DREADME.md73 [Certificate Signing Request][csr](CSR) is a message sent from an applicant to a
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/
H A D0001-Forward-port-to-OpenSSL-1.1.x.patch399 debug("Self Signing!\n");
/openbmc/openbmc/poky/meta/classes-recipe/
H A Duboot-sign.bbclass129 # Signing individual images is not recommended as that
/openbmc/u-boot/doc/
H A DREADME.armada-secureboot67 CSK - Code Signing Key(s): An array of RSA key pairs, which
/openbmc/openbmc/poky/documentation/migration-guides/
H A Dmigration-2.3.rst311 - Signing of remote package feeds using ``PACKAGE_FEED_SIGN`` is not
/openbmc/openbmc/poky/documentation/dev-manual/
H A Dpackages.rst819 Signing RPM Packages
/openbmc/openbmc/poky/documentation/ref-manual/
H A Dvariables.rst3427 Signing only the image nodes is intentionally not implemented by
/openbmc/
Dopengrok1.0.log40 2026-01-27 03:01:10.515-0600 FINE t38 EventHelper.logX509CertificateEvent: X509Certificate: Alg:SHA384withRSA, Serial:08:ad:40:b2:60:d2:9c:4c:9f:5e:cd:a9:bd:93:ae:d9, Subject:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US, Issuer:CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US, Key type:RSA, Length:4096, Cert Id:-888920455, Valid from:4/28/21, 7:00 PM, Valid until:4/28/36, 6:59 PM
41 2026-01-27 03:01:10.516-0600 FINE t38 EventHelper.logX509CertificateEvent: X509Certificate: Alg:SHA256withRSA, Serial:06:b6:05:7c:88:f8:3a:e9:84:f9:df:59:52:33:0e:e3, Subject:CN="Eclipse.org Foundation, Inc.", O="Eclipse.org Foundation, Inc.", L=Ottawa, ST=Ontario, C=CA, Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US, Key type:RSA, Length:4096, Cert Id:1133913736, Valid from:7/21/24, 7:00 PM, Valid until:7/21/25, 6:59 PM
[all...]
Dopengrok2.0.log40 2026-01-26 03:01:10.449-0600 FINE t38 EventHelper.logX509CertificateEvent: X509Certificate: Alg:SHA384withRSA, Serial:08:ad:40:b2:60:d2:9c:4c:9f:5e:cd:a9:bd:93:ae:d9, Subject:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US, Issuer:CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US, Key type:RSA, Length:4096, Cert Id:-888920455, Valid from:4/28/21, 7:00 PM, Valid until:4/28/36, 6:59 PM
41 2026-01-26 03:01:10.450-0600 FINE t38 EventHelper.logX509CertificateEvent: X509Certificate: Alg:SHA256withRSA, Serial:06:b6:05:7c:88:f8:3a:e9:84:f9:df:59:52:33:0e:e3, Subject:CN="Eclipse.org Foundation, Inc.", O="Eclipse.org Foundation, Inc.", L=Ottawa, ST=Ontario, C=CA, Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US, Key type:RSA, Length:4096, Cert Id:1133913736, Valid from:7/21/24, 7:00 PM, Valid until:7/21/25, 6:59 PM
[all...]