Home
last modified time | relevance | path

Searched refs:ca (Results 1 – 25 of 152) sorted by relevance

1234567

/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/freeradius/files/
H A D0013-raddb-certs-Makefile-fix-the-occasional-verification.patch10 chmod g+r ca.key
20 It seems the ca.pem mismatchs server.pem which results in failing to
21 execute "openssl verify -CAfile ca.pem server.pem", so add to check
35 @@ -59,7 +59,7 @@ passwords.mk: server.cnf ca.cnf client.cnf inner-server.cnf
45 ca.key ca.pem: ca.cnf
48 - $(OPENSSL) req -new -x509 -keyout ca.key -out ca.pem \
49 + @[ -f ca.pem ] || $(OPENSSL) req -new -x509 -keyout ca.key -out ca.pem \
50 -days $(CA_DEFAULT_DAYS) -config ./ca.cnf \
52 chmod g+r ca.key
54 ca.der: ca.pem
[all …]
H A D0012-raddb-certs-Makefile-fix-the-existed-certificate-err.patch9 openssl ca -batch -keyfile ca.key -cert ca.pem -in client.csr -key 'whatever' -out client.crt -ext…
38 server.crt: ca.key ca.pem server.csr
39 - $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in server.csr -key $(PASSWORD_CA) -out server…
40 + @[ -f server.crt ] || $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in server.csr -key $(PA…
47 client.crt: ca.key ca.pem client.csr
48 - $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in client.csr -key $(PASSWORD_CA) -out client…
49 + @[ -f client.crt ] || $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in client.csr -key $(PA…
/openbmc/openbmc/poky/meta/recipes-support/ca-certificates/
H A Dca-certificates_20250419.bb5 HOMEPAGE = "http://packages.debian.org/sid/ca-certificates"
18 SRC_URI = "${DEBIAN_MIRROR}/main/c/ca-certificates/${BPN}_${PV}.tar.xz \
19 file://0001-update-ca-certificates-don-t-use-Debianisms-in-run-p.patch \
20 file://0003-update-ca-certificates-use-relative-symlinks-from-ET.patch \
23 S = "${WORKDIR}/ca-certificates"
27 'CERTSDIR=${datadir}/ca-certificates' \
36 install -d ${D}${datadir}/ca-certificates \
38 ${D}${sysconfdir}/ca-certificates/update.d
42 install -m 0644 sbin/update-ca-certificates.8 ${D}${mandir}/man8/
49 find ${D}${datadir}/ca-certificates -type f -name '*.crt' | \
[all …]
/openbmc/openbmc/poky/meta/recipes-support/ca-certificates/ca-certificates/
H A D0001-update-ca-certificates-don-t-use-Debianisms-in-run-p.patch4 Subject: [PATCH] ca-certificates: remove Debianism in run-parts invocation
6 ca-certificates is a package from Debian, but some host distros such as Fedora
12 | Running hooks in [...]/rootfs/etc/ca-certificates/update.d...
13 | [...]/usr/sbin/update-ca-certificates: line 194: Not: command not found
14 | [...]/usr/sbin/update-ca-certificates: line 230: Not a directory: --: command not found
21 sbin/update-ca-certificates | 4 +---
24 diff --git a/sbin/update-ca-certificates b/sbin/update-ca-certificates
26 --- a/sbin/update-ca-certificates
27 +++ b/sbin/update-ca-certificates
H A D0003-update-ca-certificates-use-relative-symlinks-from-ET.patch4 Subject: [PATCH] update-ca-certificates: use relative symlinks from
10 update-ca-certificates symlinks (trusted) certificates
12 update-ca-certificates can call hook scripts installed
13 into /etc/ca-certificates/update.d. Those scripts are
18 When running update-ca-certificates during image build
44 sbin/update-ca-certificates | 6 ++++--
47 diff --git a/sbin/update-ca-certificates b/sbin/update-ca-certificates
49 --- a/sbin/update-ca-certificates
50 +++ b/sbin/update-ca-certificates
51 @@ -30,6 +30,7 @@ LOCALCERTSDIR=/usr/local/share/ca-certificates
[all …]
/openbmc/openbmc/meta-security/meta-integrity/scripts/
H A Dima-gen-local-ca.sh17 GENKEY=ima-local-ca.genkey
40 -outform DER -out ima-local-ca.x509 -keyout ima-local-ca.priv
42 openssl x509 -inform DER -in ima-local-ca.x509 -out ima-local-ca.pem
H A Dima-gen-CA-signed.sh18 CA=${1:-ima-local-ca.pem}
19 CAKEY=${2:-ima-local-ca.priv}
/openbmc/openbmc/poky/meta/recipes-core/meta/
H A Dbuildtools-tarball.bb28 nativesdk-ca-certificates \
83 # Detect host ca file/path, export for envfile to use
84 # /etc/ssl/certs/ca-certificates.crt Debian systems
85 # /etc/pki/tls/certs/ca-bundle.crt Fedora systems
86 # /etc/ssl/ca-bundle.pem Suse systems
89 for a in /etc/ssl/certs/ca-certificates.crt \
90 /etc/pki/tls/certs/ca-bundle.crt \
91 /etc/ssl/ca-bundle.pem ; do
/openbmc/openbmc/meta-security/meta-integrity/data/debug-keys/
H A DREADME.md5 - ima-local-ca.priv: The CA's private key (password: 1234)
6 - ima-local-ca.pem: The CA's self-signed certificate
16 openssl verify -CAfile ima-local-ca.pem x509_ima.der
/openbmc/phosphor-certificate-manager/dist/
H A Dbmc-vmi-ca-manager.service5 ExecStart=/usr/bin/bmc-vmi-ca
10 BusName=xyz.openbmc_project.Certs.ca.authority.Manager
H A Dmeson.build10 if get_option('ca-cert-extension').allowed()
11 busconfig += 'busconfig/bmc-vmi-ca.conf'
12 service_files += 'bmc-vmi-ca-manager.service'
/openbmc/qemu/docs/system/
H A Dtls.rst54 # certtool --generate-privkey > ca-key.pem
57 information, the name of the organization. A template file ``ca.info``
61 # cat > ca.info <<EOF
63 ca
67 --load-privkey ca-key.pem \
68 --template ca.info \
69 --outfile ca-cert.pem
71 The ``ca`` keyword in the template sets the v3 basic constraints
74 be used for signing other keys. The generated ``ca-cert.pem`` file
76 support in the VNC server. The ``ca-key.pem`` must not be
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/pidgin/
H A Dpidgin-otr_4.0.2.bb2 HOMEPAGE = "https://otr.cypherpunks.ca/"
8 SRC_URI = "https://otr.cypherpunks.ca/${BP}.tar.gz \
H A Dlibotr_4.1.1.bb2 HOMEPAGE = "http://www.cypherpunks.ca/otr/"
7 SRC_URI = "http://www.cypherpunks.ca/otr/${BP}.tar.gz \
/openbmc/qemu/tests/qemu-iotests/
H A Dcommon.tls111 name=${1:-ca-cert}
115 ca
150 --load-ca-privkey "${tls_dir}/key.pem" \
151 --load-ca-certificate "${tls_dir}/$caname-cert.pem" \
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-benchmark/memtester/
H A Dmemtester_4.7.1.bb2 HOMEPAGE = "http://pyropus.ca/software/memtester/"
8 SRC_URI = "http://pyropus.ca/software/memtester/old-versions/${BP}.tar.gz \
/openbmc/qemu/docs/system/devices/
H A Dccid.rst59 certutil -S -d sql:$PWD -s "CN=Fake Smart Card CA" -x -t TC,TC,TC -n fake-smartcard-ca
60 certutil -S -d sql:$PWD -t ,, -s "CN=John Doe" -n id-cert -c fake-smartcard-ca
61 …d sql:$PWD -t ,, -s "CN=John Doe (signing)" --nsCertType smime -n signing-cert -c fake-smartcard-ca
62 … -t ,, -s "CN=John Doe (encryption)" --nsCertType sslClient -n encryption-cert -c fake-smartcard-ca
72 certutil -L -r -d sql:$PWD -o fake-smartcard-ca.cer -n fake-smartcard-ca
76 certutil -A -d /etc/pki/nssdb -i fake-smartcard-ca.cer -t TC,TC,TC -n fake-smartcard-ca
88 fake-smartcard-ca CT,C,C
/openbmc/phosphor-certificate-manager/test/
H A Dmeson.build44 if get_option('ca-cert-extension').allowed()
48 'test-ca-certs-manager',
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/autossh/
H A Dautossh_1.4g.bb2 HOMEPAGE = "https://www.harding.motd.ca/autossh/"
8 SRC_URI = "https://www.harding.motd.ca/autossh/${BP}.tgz"
/openbmc/qemu/util/
H A Dqsp.c465 const QSPCallSite *ca; in qsp_tree_cmp() local
492 ca = a->callsite; in qsp_tree_cmp()
495 if (ca->obj < cb->obj) { in qsp_tree_cmp()
497 } else if (ca->obj > cb->obj) { in qsp_tree_cmp()
503 cmp = strcmp(ca->file, cb->file); in qsp_tree_cmp()
508 g_assert(ca->line != cb->line); in qsp_tree_cmp()
509 if (ca->line < cb->line) { in qsp_tree_cmp()
511 } else if (ca->line > cb->line) { in qsp_tree_cmp()
515 return cb->type - ca->type; in qsp_tree_cmp()
/openbmc/phosphor-certificate-manager/bmc-vmi-ca/
H A Dca_cert_entry.cpp7 namespace ca::cert namespace
H A Dmainapp.cpp17 ca::cert::CACertMgr manager(bus, objPath); in main()
/openbmc/phosphor-certificate-manager/
H A Dmeson.build86 if get_option('ca-cert-extension').allowed()
87 subdir('bmc-vmi-ca')
/openbmc/qemu/pc-bios/keymaps/
H A Dmeson.build16 'fr-ca': '-l ca -v fr',
/openbmc/openbmc/poky/meta/files/common-licenses/
H A Dmagaz1 Copyright 1999-2011, Donald Arseneau, asnd@triumf.ca, Vancouver, Canada

1234567