| /openbmc/openbmc/poky/meta/recipes-devtools/file/files/ |
| H A D | 0001-Use-4-in-default-reset-previous-negative-offset-in-m.patch | 26 >>>>>>(-6.l-16) string APK\x20Sig\x20Block\x2042 \b, with APK Signing Block 46 +# APK Signing Block 57 -# APK Signing Block 60 ->>>(-6.l-16) string APK\x20Sig\x20Block\x2042 Android package (APK), with APK Signing Block 63 +>>>>>(-6.l-16) string APK\x20Sig\x20Block\x2042 Android package (APK), with APK Signing Block
|
| /openbmc/openbmc/meta-arm/meta-arm/classes/ |
| H A D | sbsign.bbclass | 23 bbnote "Signing ${PN} binary ${SBSIGN_TARGET_BINARY} with ${SBSIGN_KEY} and ${SBSIGN_CERT}"
|
| /openbmc/openbmc/meta-security/meta-integrity/classes/ |
| H A D | ima-evm-rootfs.bbclass | 84 bbnote "IMA/EVM: Signing root filesystem at ${IMAGE_ROOTFS} with key ${IMA_EVM_PRIVKEY}" 100 bbnote "IMA/EVM: Signing IMA policy with key ${IMA_EVM_PRIVKEY}" 118 # Signing must run as late as possible in the do_rootfs task.
|
| /openbmc/u-boot/doc/imx/habv4/ |
| H A D | introduction_habv4.txt | 64 authentication process, this is generated by the Code Signing Tool[1]. 68 Details about the Secure Boot and Code Signing Tool (CST) can be found in 123 The Code Signing Tool automatically generates a random AES Data Encryption Key 149 The Code Signing Tools package contains an OpenSSL based key generation script 259 [1] CST: i.MX High Assurance Boot Reference Code Signing Tool.
|
| /openbmc/u-boot/doc/uImage.FIT/ |
| H A D | verified-boot.txt | 22 Signing 34 Signing Verification
|
| H A D | signature.txt | 391 Hardware Signing with PKCS#11
|
| /openbmc/openbmc/poky/meta/classes/ |
| H A D | sign_ipk.bbclass | 49 bb.debug(1, 'Signing ipk: %s' % ipk_to_sign)
|
| /openbmc/u-boot/doc/imx/habv4/guides/ |
| H A D | encrypted_boot.txt | 4 Encrypted Boot. The image is encrypted by i.MX Code Signing
|
| H A D | mx6_mx7_secure_boot.txt | 113 1.4 Signing the U-Boot binary 369 2.3 Signing the image
|
| H A D | mx6_mx7_spl_secure_boot.txt | 145 1.4 Signing the images
|
| /openbmc/openbmc/poky/meta/lib/oeqa/selftest/cases/ |
| H A D | signing.py | 19 class Signing(OESelftestTestCase): class
|
| /openbmc/openbmc/meta-security/meta-integrity/ |
| H A D | README.md | 128 # Signing images then will not require entering that passphrase, 240 * Signing files in advance with a X509 certificate and then not having
|
| /openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
| H A D | test_certificates_sub_menu.robot | 19 ${xpath_generate_csr_heading} //h5[contains(text(), "Generate a Certificate Signing Request")]
|
| /openbmc/u-boot/doc/imx/mkimage/ |
| H A D | imximage.txt | 107 Freescale Code Signing Tool, available on the
|
| /openbmc/docs/designs/management-console/ |
| H A D | VMI_Certificate_Exchange.md | 159 - Certificate Signing Request CSR is a message sent from an applicant to a
|
| /openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/ |
| H A D | README.md | 73 [Certificate Signing Request][csr](CSR) is a message sent from an applicant to a
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/ |
| H A D | 0001-Forward-port-to-OpenSSL-1.1.x.patch | 399 debug("Self Signing!\n");
|
| /openbmc/openbmc/poky/meta/classes-recipe/ |
| H A D | uboot-sign.bbclass | 129 # Signing individual images is not recommended as that
|
| /openbmc/u-boot/doc/ |
| H A D | README.armada-secureboot | 67 CSK - Code Signing Key(s): An array of RSA key pairs, which
|
| /openbmc/openbmc/poky/documentation/migration-guides/ |
| H A D | migration-2.3.rst | 311 - Signing of remote package feeds using ``PACKAGE_FEED_SIGN`` is not
|
| /openbmc/openbmc/poky/documentation/dev-manual/ |
| H A D | packages.rst | 819 Signing RPM Packages
|
| /openbmc/openbmc/poky/documentation/ref-manual/ |
| H A D | variables.rst | 3427 Signing only the image nodes is intentionally not implemented by
|
| /openbmc/ |
| D | opengrok1.0.log | 40 2026-01-27 03:01:10.515-0600 FINE t38 EventHelper.logX509CertificateEvent: X509Certificate: Alg:SHA384withRSA, Serial:08:ad:40:b2:60:d2:9c:4c:9f:5e:cd:a9:bd:93:ae:d9, Subject:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US, Issuer:CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US, Key type:RSA, Length:4096, Cert Id:-888920455, Valid from:4/28/21, 7:00 PM, Valid until:4/28/36, 6:59 PM 41 2026-01-27 03:01:10.516-0600 FINE t38 EventHelper.logX509CertificateEvent: X509Certificate: Alg:SHA256withRSA, Serial:06:b6:05:7c:88:f8:3a:e9:84:f9:df:59:52:33:0e:e3, Subject:CN="Eclipse.org Foundation, Inc.", O="Eclipse.org Foundation, Inc.", L=Ottawa, ST=Ontario, C=CA, Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US, Key type:RSA, Length:4096, Cert Id:1133913736, Valid from:7/21/24, 7:00 PM, Valid until:7/21/25, 6:59 PM [all...] |
| D | opengrok2.0.log | 40 2026-01-26 03:01:10.449-0600 FINE t38 EventHelper.logX509CertificateEvent: X509Certificate: Alg:SHA384withRSA, Serial:08:ad:40:b2:60:d2:9c:4c:9f:5e:cd:a9:bd:93:ae:d9, Subject:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US, Issuer:CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US, Key type:RSA, Length:4096, Cert Id:-888920455, Valid from:4/28/21, 7:00 PM, Valid until:4/28/36, 6:59 PM 41 2026-01-26 03:01:10.450-0600 FINE t38 EventHelper.logX509CertificateEvent: X509Certificate: Alg:SHA256withRSA, Serial:06:b6:05:7c:88:f8:3a:e9:84:f9:df:59:52:33:0e:e3, Subject:CN="Eclipse.org Foundation, Inc.", O="Eclipse.org Foundation, Inc.", L=Ottawa, ST=Ontario, C=CA, Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US, Key type:RSA, Length:4096, Cert Id:1133913736, Valid from:7/21/24, 7:00 PM, Valid until:7/21/25, 6:59 PM [all...] |