| /openbmc/openbmc/meta-security/meta-integrity/classes/ |
| H A D | sanity-meta-integrity.bbclass | 5 if 'integrity' not in e.data.getVar('DISTRO_FEATURES').split() and not skip_check: 6 bb.warn("You have included the meta-integrity layer, but \ 7 'integrity' has not been enabled in your DISTRO_FEATURES. Some bbappend files \ 8 and preferred version setting may not take effect. See the meta-integrity README \ 9 for details on enabling integrity support.")
|
| /openbmc/phosphor-net-ipmid/test/ |
| H A D | cipher.cpp | 27 auto algoPtr = std::make_unique<cipher::integrity::AlgoSHA1>(sik); in TEST() 35 cipher::integrity::AlgoSHA1::SHA1_96_AUTHCODE_LENGTH)); in TEST() 65 output.resize(cipher::integrity::AlgoSHA1::SHA1_96_AUTHCODE_LENGTH); in TEST() 113 output.resize(cipher::integrity::AlgoSHA1::SHA1_96_AUTHCODE_LENGTH); in TEST() 129 auto algoPtr = std::make_unique<cipher::integrity::AlgoSHA1>(sik); in TEST() 148 std::vector<uint8_t> integrity = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12}; in TEST() local 150 packet.insert(packet.end(), integrity.begin(), integrity.end()); in TEST() 154 std::advance(integrityIter, integrity.size()); in TEST() 164 auto algoPtr = std::make_unique<cipher::integrity::AlgoSHA1>(sik); in TEST() 189 auto algoPtr = std::make_unique<cipher::integrity::AlgoSHA256>(sik); in TEST() [all …]
|
| /openbmc/phosphor-net-ipmid/ |
| H A D | auth_algo.hpp | 52 explicit Interface(integrity::Algorithms intAlgo, in Interface() 137 integrity::Algorithms intAlgo; 164 explicit AlgoSHA1(integrity::Algorithms intAlgo, in AlgoSHA1() 199 explicit AlgoSHA256(integrity::Algorithms intAlgo, in AlgoSHA256()
|
| H A D | session.hpp | 178 std::unique_ptr<cipher::integrity::Interface>&& integrityAlgo) in setIntegrityAlgo() 302 std::unique_ptr<cipher::integrity::Interface> integrityAlgoInterface =
|
| /openbmc/u-boot/arch/x86/include/asm/fsp/ |
| H A D | fsp_ffs.h | 50 union ffs_integrity integrity; member 73 union ffs_integrity integrity; member
|
| /openbmc/phosphor-net-ipmid/command/ |
| H A D | open_session.cpp | 42 if (!cipher::integrity::Interface::isAlgorithmSupported( in openSession() 43 static_cast<cipher::integrity::Algorithms>(request->intAlgo))) in openSession() 82 static_cast<cipher::integrity::Algorithms>(request->intAlgo), in openSession()
|
| H A D | rakp34.cpp | 25 case cipher::integrity::Algorithms::HMAC_SHA1_96: in applyIntegrityAlgo() 28 std::make_unique<cipher::integrity::AlgoSHA1>( in applyIntegrityAlgo() 32 case cipher::integrity::Algorithms::HMAC_SHA256_128: in applyIntegrityAlgo() 35 std::make_unique<cipher::integrity::AlgoSHA256>( in applyIntegrityAlgo()
|
| H A D | channel_auth.cpp | 97 static constexpr const char* integrity = "integrity"; variable 163 cipherRecords.push_back(record.value(integrity, 0) | integrityTag); in getCipherRecords() 164 supportedAlgorithmSet.insert(record.value(integrity, 0) | integrityTag); in getCipherRecords()
|
| /openbmc/ipmitool/src/plugins/lanplus/ |
| H A D | README.lanplus | 13 algorithms, whereas the integrity algorithms are not all HMAC. See section 28 integrity checking. One the one hand, section 13.28.4 states explicitly 29 that HMAC integrity algorithms use the session integrity key as the HMAC 32 "all keying material for the RSP integrity and confidentiality algorithms 35 integrity and confidentiality algorithms defined in this specification, 38 of authentication codes (integrity checking). Furthermore, we are using
|
| /openbmc/openbmc/meta-security/meta-integrity/ |
| H A D | README.md | 2 integrity layer. 6 to have 'integrity' in DISTRO_FEATURES to have effect. 9 DISTRO_FEATURES:append = " integrity" 11 If meta-integrity is included, but integrity is not enabled as a 15 'integrity' has not been enabled in your DISTRO_FEATURES. Some bbappend files 45 make sure to copy the maintainer and add a "[meta-integrity]" 54 1. Adding the integrity layer to your build 59 1. Adding the integrity layer to your build 67 location of the integrity layer to bblayers.conf, along with any 74 /path/to/yocto/meta-security/meta-integrity \ [all …]
|
| /openbmc/openbmc/poky/bitbake/lib/bb/fetch2/ |
| H A D | npmsw.py | 86 integrity = params.get("integrity") 97 elif version and is_semver(version) and integrity: 107 checksum_name, checksum_expected = npm_integrity(integrity) 125 elif resolved.startswith("http") and integrity: 131 checksum_name, checksum_expected = npm_integrity(integrity)
|
| H A D | npm.py | 67 def npm_integrity(integrity): argument 72 algo, value = integrity.split("-", maxsplit=1) 242 integrity = view.get("dist", {}).get("integrity") 245 if integrity is not None: 246 checksum_name, checksum_expected = npm_integrity(integrity)
|
| /openbmc/entity-manager/configurations/meta/minerva/ |
| H A D | minerva_sitv.json | 28 /* Signal integrity test vehicle board */
|
| /openbmc/openbmc/meta-security/meta-integrity/recipes-kernel/linux/ |
| H A D | linux-yocto%.bbappend | 3 require ${@bb.utils.contains_any('DISTRO_FEATURES', 'integrity ', 'linux_ima.inc', '', d)}
|
| /openbmc/openbmc/meta-security/meta-integrity/conf/ |
| H A D | layer.conf | 39 WARN_QA:append:integrity = " patch-status missing-metadata"
|
| /openbmc/openbmc/poky/meta/recipes-extended/mdadm/files/ |
| H A D | run-ptest | 10 ./test --keep-going --disable-integrity --skip-broken --save-logs --logdir=$logdir
|
| /openbmc/openbmc/meta-security/recipes-ids/tripwire/files/ |
| H A D | tripwire.txt | 5 3. Run the first integrity check. (/usr/sbin/tripwire--check) 12 … policy file greatly increases Tripwire software's ability to ensure the integrity of your system. 27 … the rules in the policy file. This database serves as the baseline for integrity checks. The synt… 40 Database Update mode enables you to update the Tripwire database after an integrity check if you de… 56 …ine against the current system to determine what changes have occurred. This is an integrity check. 58 …n integrity check, Tripwire software produces report files. Report files summarize any changes tha…
|
| /openbmc/openbmc/meta-security/meta-integrity/recipes-core/images/ |
| H A D | integrity-image-minimal.bb | 15 export IMAGE_BASENAME = "integrity-image-minimal"
|
| /openbmc/qemu/docs/devel/ |
| H A D | index-build.rst | 16 control-flow-integrity
|
| /openbmc/phosphor-host-ipmid/app/ |
| H A D | channel.hpp | 38 static constexpr auto integrity = "integrity"; variable
|
| H A D | channel.cpp | 92 cipherRecords.push_back(record.value(integrity, 0) | integrityTag); in getCipherRecords() 93 supportedAlgorithmSet.insert(record.value(integrity, 0) | integrityTag); in getCipherRecords()
|
| /openbmc/docs/designs/ |
| H A D | redfish-spdm-attestation.md | 15 to authenticate device identity, hardware configuration and firmware integrity. 36 identity and integrity of devices. 66 `Attestation.ComponentIntegrity` provides basic component integrity information, 67 including the protocol to measure the integrity, last updated time, attestation 69 including a link to the trusted component that the component integrity object is 70 reporting, and a link to the systems that the component integrity object is 82 [component-integrity](https://gerrit.openbmc.org/c/openbmc/phosphor-dbus-interfaces/+/64354). 90 a device. It can securely measure the integrity information of a device. 99 integrity object reported by this `TrustedComponent`. 213 trusted component object and component integrity object.
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/nodejs/nodejs-oe-cache-22.16/ |
| H A D | oe-npm-cache | 75 .then(integrity => {
|
| /openbmc/openbmc/meta-security/recipes-core/images/ |
| H A D | security-test-image.bb | 12 ${@bb.utils.contains("BBFILE_COLLECTIONS", "integrity", "packagegroup-ima-evm-utils","", d)} \
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/pngcheck/ |
| H A D | pngcheck_2.3.0.bb | 1 SUMMARY = "pngcheck verifies the integrity of PNG, JNG and MNG files"
|