Home
last modified time | relevance | path

Searched refs:Signing (Results 1 – 25 of 30) sorted by relevance

12

/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/
H A DEntry.interface.yaml19 Signing operation state enum.
23 Signing request is pending.
H A DCSR.interface.yaml2 Implement to retrieve the Certificate Signing Request(CSR).
H A DAuthority.interface.yaml2 Signs Certificate Signing Request.
H A DREADME.md73 [Certificate Signing Request][csr](CSR) is a message sent from an applicant to a
/openbmc/openbmc/meta-security/meta-integrity/classes/
H A Dima-evm-rootfs.bbclass76 bbnote "IMA/EVM: Signing root filesystem at ${IMAGE_ROOTFS} with key ${IMA_EVM_PRIVKEY}"
89 bbnote "IMA/EVM: Signing IMA policy with key ${IMA_EVM_PRIVKEY}"
106 # Signing must run as late as possible in the do_rootfs task.
/openbmc/u-boot/doc/imx/habv4/
H A Dintroduction_habv4.txt64 authentication process, this is generated by the Code Signing Tool[1].
68 Details about the Secure Boot and Code Signing Tool (CST) can be found in
123 The Code Signing Tool automatically generates a random AES Data Encryption Key
149 The Code Signing Tools package contains an OpenSSL based key generation script
259 [1] CST: i.MX High Assurance Boot Reference Code Signing Tool.
/openbmc/u-boot/doc/uImage.FIT/
H A Dverified-boot.txt22 Signing
34 Signing Verification
H A Dsignature.txt391 Hardware Signing with PKCS#11
/openbmc/openbmc/poky/meta/classes/
H A Dsign_ipk.bbclass49 bb.debug(1, 'Signing ipk: %s' % ipk_to_sign)
/openbmc/u-boot/doc/imx/habv4/guides/
H A Dencrypted_boot.txt4 Encrypted Boot. The image is encrypted by i.MX Code Signing
H A Dmx6_mx7_secure_boot.txt113 1.4 Signing the U-Boot binary
369 2.3 Signing the image
H A Dmx6_mx7_spl_secure_boot.txt145 1.4 Signing the images
/openbmc/openbmc/poky/meta/lib/oeqa/selftest/cases/
H A Dsigning.py19 class Signing(OESelftestTestCase): class
/openbmc/linux/Documentation/filesystems/smb/
H A Dksmbd.rst79 HMAC-SHA256 Signing Supported.
81 Signing Update Supported.
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/
H A Dtest_certificates_sub_menu.robot19 ${xpath_generate_csr_heading} //h5[contains(text(), "Generate a Certificate Signing Request")]
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/CSR/
H A DCreate.interface.yaml2 Implement to create Certificate Signing Request(CSR).
/openbmc/openbmc/meta-security/meta-integrity/
H A DREADME.md125 # Signing images then will not require entering that passphrase,
242 * Signing files in advance with a X509 certificate and then not having
/openbmc/u-boot/doc/imx/mkimage/
H A Dimximage.txt107 Freescale Code Signing Tool, available on the
/openbmc/docs/designs/management-console/
H A DVMI_Certificate_Exchange.md161 - Certificate Signing Request CSR is a message sent from an applicant to a
/openbmc/openbmc/poky/meta/recipes-support/libssh2/libssh2/
H A DCVE-2023-48795.patch93 Signing) */
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/
H A D0001-Forward-port-to-OpenSSL-1.1.x.patch399 debug("Self Signing!\n");
/openbmc/linux/Documentation/process/
H A Demail-clients.rst153 patches so do not GPG sign them. Signing patches that have been inserted
H A Dmaintainer-pgp-guide.rst193 Create a separate Signing subkey
838 Signing tags and commits is easy, but how does one go about verifying
/openbmc/linux/Documentation/translations/sp_SP/process/
H A Demail-clients.rst165 patches so do not GPG sign them. Signing patches that have been inserted
/openbmc/u-boot/doc/
H A DREADME.armada-secureboot67 CSK - Code Signing Key(s): An array of RSA key pairs, which

12