| /openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/freeradius/files/ |
| H A D | 0013-raddb-certs-Makefile-fix-the-occasional-verification.patch | 10 chmod g+r ca.key 20 It seems the ca.pem mismatchs server.pem which results in failing to 21 execute "openssl verify -CAfile ca.pem server.pem", so add to check 35 @@ -59,7 +59,7 @@ passwords.mk: server.cnf ca.cnf client.cnf inner-server.cnf 45 ca.key ca.pem: ca.cnf 48 - $(OPENSSL) req -new -x509 -keyout ca.key -out ca.pem \ 49 + @[ -f ca.pem ] || $(OPENSSL) req -new -x509 -keyout ca.key -out ca.pem \ 50 -days $(CA_DEFAULT_DAYS) -config ./ca.cnf \ 52 chmod g+r ca.key 54 ca.der: ca.pem [all …]
|
| H A D | 0012-raddb-certs-Makefile-fix-the-existed-certificate-err.patch | 9 openssl ca -batch -keyfile ca.key -cert ca.pem -in client.csr -key 'whatever' -out client.crt -ext… 38 server.crt: ca.key ca.pem server.csr 39 - $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in server.csr -key $(PASSWORD_CA) -out server… 40 + @[ -f server.crt ] || $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in server.csr -key $(PA… 47 client.crt: ca.key ca.pem client.csr 48 - $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in client.csr -key $(PASSWORD_CA) -out client… 49 + @[ -f client.crt ] || $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in client.csr -key $(PA…
|
| /openbmc/openbmc/poky/meta/recipes-support/ca-certificates/ |
| H A D | ca-certificates_20250419.bb | 5 HOMEPAGE = "http://packages.debian.org/sid/ca-certificates" 18 SRC_URI = "${DEBIAN_MIRROR}/main/c/ca-certificates/${BPN}_${PV}.tar.xz \ 19 file://0001-update-ca-certificates-don-t-use-Debianisms-in-run-p.patch \ 20 file://0003-update-ca-certificates-use-relative-symlinks-from-ET.patch \ 23 S = "${WORKDIR}/ca-certificates" 27 'CERTSDIR=${datadir}/ca-certificates' \ 36 install -d ${D}${datadir}/ca-certificates \ 38 ${D}${sysconfdir}/ca-certificates/update.d 42 install -m 0644 sbin/update-ca-certificates.8 ${D}${mandir}/man8/ 49 find ${D}${datadir}/ca-certificates -type f -name '*.crt' | \ [all …]
|
| /openbmc/openbmc/poky/meta/recipes-support/ca-certificates/ca-certificates/ |
| H A D | 0001-update-ca-certificates-don-t-use-Debianisms-in-run-p.patch | 4 Subject: [PATCH] ca-certificates: remove Debianism in run-parts invocation 6 ca-certificates is a package from Debian, but some host distros such as Fedora 12 | Running hooks in [...]/rootfs/etc/ca-certificates/update.d... 13 | [...]/usr/sbin/update-ca-certificates: line 194: Not: command not found 14 | [...]/usr/sbin/update-ca-certificates: line 230: Not a directory: --: command not found 21 sbin/update-ca-certificates | 4 +--- 24 diff --git a/sbin/update-ca-certificates b/sbin/update-ca-certificates 26 --- a/sbin/update-ca-certificates 27 +++ b/sbin/update-ca-certificates
|
| H A D | 0003-update-ca-certificates-use-relative-symlinks-from-ET.patch | 4 Subject: [PATCH] update-ca-certificates: use relative symlinks from 10 update-ca-certificates symlinks (trusted) certificates 12 update-ca-certificates can call hook scripts installed 13 into /etc/ca-certificates/update.d. Those scripts are 18 When running update-ca-certificates during image build 44 sbin/update-ca-certificates | 6 ++++-- 47 diff --git a/sbin/update-ca-certificates b/sbin/update-ca-certificates 49 --- a/sbin/update-ca-certificates 50 +++ b/sbin/update-ca-certificates 51 @@ -30,6 +30,7 @@ LOCALCERTSDIR=/usr/local/share/ca-certificates [all …]
|
| /openbmc/openbmc/meta-security/meta-integrity/scripts/ |
| H A D | ima-gen-local-ca.sh | 17 GENKEY=ima-local-ca.genkey 40 -outform DER -out ima-local-ca.x509 -keyout ima-local-ca.priv 42 openssl x509 -inform DER -in ima-local-ca.x509 -out ima-local-ca.pem
|
| H A D | ima-gen-CA-signed.sh | 18 CA=${1:-ima-local-ca.pem} 19 CAKEY=${2:-ima-local-ca.priv}
|
| /openbmc/openbmc/poky/meta/recipes-core/meta/ |
| H A D | buildtools-tarball.bb | 28 nativesdk-ca-certificates \ 83 # Detect host ca file/path, export for envfile to use 84 # /etc/ssl/certs/ca-certificates.crt Debian systems 85 # /etc/pki/tls/certs/ca-bundle.crt Fedora systems 86 # /etc/ssl/ca-bundle.pem Suse systems 89 for a in /etc/ssl/certs/ca-certificates.crt \ 90 /etc/pki/tls/certs/ca-bundle.crt \ 91 /etc/ssl/ca-bundle.pem ; do
|
| /openbmc/openbmc/meta-security/meta-integrity/data/debug-keys/ |
| H A D | README.md | 5 - ima-local-ca.priv: The CA's private key (password: 1234) 6 - ima-local-ca.pem: The CA's self-signed certificate 16 openssl verify -CAfile ima-local-ca.pem x509_ima.der
|
| /openbmc/phosphor-certificate-manager/dist/ |
| H A D | bmc-vmi-ca-manager.service | 5 ExecStart=/usr/bin/bmc-vmi-ca 10 BusName=xyz.openbmc_project.Certs.ca.authority.Manager
|
| H A D | meson.build | 10 if get_option('ca-cert-extension').allowed() 11 busconfig += 'busconfig/bmc-vmi-ca.conf' 12 service_files += 'bmc-vmi-ca-manager.service'
|
| /openbmc/qemu/docs/system/ |
| H A D | tls.rst | 54 # certtool --generate-privkey > ca-key.pem 57 information, the name of the organization. A template file ``ca.info`` 61 # cat > ca.info <<EOF 63 ca 67 --load-privkey ca-key.pem \ 68 --template ca.info \ 69 --outfile ca-cert.pem 71 The ``ca`` keyword in the template sets the v3 basic constraints 74 be used for signing other keys. The generated ``ca-cert.pem`` file 76 support in the VNC server. The ``ca-key.pem`` must not be [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/pidgin/ |
| H A D | pidgin-otr_4.0.2.bb | 2 HOMEPAGE = "https://otr.cypherpunks.ca/" 8 SRC_URI = "https://otr.cypherpunks.ca/${BP}.tar.gz \
|
| H A D | libotr_4.1.1.bb | 2 HOMEPAGE = "http://www.cypherpunks.ca/otr/" 7 SRC_URI = "http://www.cypherpunks.ca/otr/${BP}.tar.gz \
|
| /openbmc/qemu/tests/qemu-iotests/ |
| H A D | common.tls | 111 name=${1:-ca-cert} 115 ca 150 --load-ca-privkey "${tls_dir}/key.pem" \ 151 --load-ca-certificate "${tls_dir}/$caname-cert.pem" \
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-benchmark/memtester/ |
| H A D | memtester_4.7.1.bb | 2 HOMEPAGE = "http://pyropus.ca/software/memtester/" 8 SRC_URI = "http://pyropus.ca/software/memtester/old-versions/${BP}.tar.gz \
|
| /openbmc/qemu/docs/system/devices/ |
| H A D | ccid.rst | 59 certutil -S -d sql:$PWD -s "CN=Fake Smart Card CA" -x -t TC,TC,TC -n fake-smartcard-ca 60 certutil -S -d sql:$PWD -t ,, -s "CN=John Doe" -n id-cert -c fake-smartcard-ca 61 …d sql:$PWD -t ,, -s "CN=John Doe (signing)" --nsCertType smime -n signing-cert -c fake-smartcard-ca 62 … -t ,, -s "CN=John Doe (encryption)" --nsCertType sslClient -n encryption-cert -c fake-smartcard-ca 72 certutil -L -r -d sql:$PWD -o fake-smartcard-ca.cer -n fake-smartcard-ca 76 certutil -A -d /etc/pki/nssdb -i fake-smartcard-ca.cer -t TC,TC,TC -n fake-smartcard-ca 88 fake-smartcard-ca CT,C,C
|
| /openbmc/phosphor-certificate-manager/test/ |
| H A D | meson.build | 44 if get_option('ca-cert-extension').allowed() 48 'test-ca-certs-manager',
|
| /openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/autossh/ |
| H A D | autossh_1.4g.bb | 2 HOMEPAGE = "https://www.harding.motd.ca/autossh/" 8 SRC_URI = "https://www.harding.motd.ca/autossh/${BP}.tgz"
|
| /openbmc/qemu/util/ |
| H A D | qsp.c | 465 const QSPCallSite *ca; in qsp_tree_cmp() local 492 ca = a->callsite; in qsp_tree_cmp() 495 if (ca->obj < cb->obj) { in qsp_tree_cmp() 497 } else if (ca->obj > cb->obj) { in qsp_tree_cmp() 503 cmp = strcmp(ca->file, cb->file); in qsp_tree_cmp() 508 g_assert(ca->line != cb->line); in qsp_tree_cmp() 509 if (ca->line < cb->line) { in qsp_tree_cmp() 511 } else if (ca->line > cb->line) { in qsp_tree_cmp() 515 return cb->type - ca->type; in qsp_tree_cmp()
|
| /openbmc/phosphor-certificate-manager/bmc-vmi-ca/ |
| H A D | ca_cert_entry.cpp | 7 namespace ca::cert namespace
|
| H A D | mainapp.cpp | 17 ca::cert::CACertMgr manager(bus, objPath); in main()
|
| /openbmc/phosphor-certificate-manager/ |
| H A D | meson.build | 86 if get_option('ca-cert-extension').allowed() 87 subdir('bmc-vmi-ca')
|
| /openbmc/qemu/pc-bios/keymaps/ |
| H A D | meson.build | 16 'fr-ca': '-l ca -v fr',
|
| /openbmc/openbmc/poky/meta/files/common-licenses/ |
| H A D | magaz | 1 Copyright 1999-2011, Donald Arseneau, asnd@triumf.ca, Vancouver, Canada
|