/openbmc/linux/arch/s390/boot/ |
H A D | ipl_report.c | 20 static struct ipl_rb_certificates *certs; variable 42 for_each_rb_entry(cert, certs) in get_cert_comp_list_size() 55 for_each_rb_entry(cert, certs) { in ipl_report_certs_intersects() 79 for_each_rb_entry(cert, certs) { in copy_certificates_bootdata() 114 certs = NULL; in read_ipl_report() 123 certs = (struct ipl_rb_certificates *) rb_hdr; in read_ipl_report() 139 if (!comps || !certs) { in read_ipl_report() 140 certs = NULL; in read_ipl_report()
|
/openbmc/openbmc/meta-google/recipes-google/default-ca-dev/ |
H A D | default-ca-dev.bb | 6 SRC_URI += "file://certs/authority/" 8 FILES:${PN} = "${sysconfdir}/ssl/certs/authority/*" 11 install -d ${D}${sysconfdir}/ssl/certs/authority 12 install -m 0644 -D ${WORKDIR}/certs/authority/* \ 13 ${D}${sysconfdir}/ssl/certs/authority
|
/openbmc/linux/net/wireless/ |
H A D | Makefile | 22 cfg80211-$(CONFIG_CFG80211_USE_KERNEL_REGDB_KEYS) += shipped-certs.o 24 cfg80211-y += extra-certs.o 27 $(obj)/shipped-certs.c: $(wildcard $(srctree)/$(src)/certs/*.hex) 36 $(obj)/extra-certs.c: $(CONFIG_CFG80211_EXTRA_REGDB_KEYDIR) \ 60 clean-files += shipped-certs.c extra-certs.c
|
H A D | .gitignore | 2 shipped-certs.c 3 extra-certs.c
|
/openbmc/bmcweb/redfish-core/lib/ |
H A D | certificate_service.hpp | 26 namespace certs namespace 222 certs::certPropIntf}; in getCertificateList() 542 service = certs::httpsServiceName; in handleReplaceCertificateAction() 551 service = certs::ldapServiceName; in handleReplaceCertificateAction() 706 objectPath = certs::httpsObjectPath; in handleGenerateCSRAction() 707 service = certs::httpsServiceName; in handleGenerateCSRAction() 712 objectPath = certs::ldapObjectPath; in handleGenerateCSRAction() 713 service = certs::ldapServiceName; in handleGenerateCSRAction() 985 certs::httpsServiceName, certs::httpsObjectPath, certs::certInstallIntf, in handleHTTPSCertificateCollectionPost() 1099 certs::ldapServiceName, certs::ldapObjectPath, certs::certInstallIntf, in handleLDAPCertificateCollectionPost() [all …]
|
/openbmc/phosphor-certificate-manager/ |
H A D | argument.cpp | 7 namespace phosphor::certs namespace 23 phosphor::certs::CertificateType type = in processArguments() 24 phosphor::certs::stringToCertificateType(arguments.typeStr); in processArguments() 25 if (type == phosphor::certs::CertificateType::unsupported) in processArguments()
|
H A D | mainapp.cpp | 45 phosphor::certs::Arguments arguments; in main() 46 if (phosphor::certs::processArguments(argc, argv, arguments) != 0) in main() 62 phosphor::certs::Manager manager( in main() 64 phosphor::certs::stringToCertificateType(arguments.typeStr), in main()
|
H A D | README.md | 34 --path=/etc/ssl/certs/https/server.pem --unit=bmcweb.service 43 --path=/etc/ssl/certs/authority --unit=bmcweb.service 52 --path=/etc/nslcd/certs/cert.pem 63 constructed by "/xyz/openbmc_project/certs/{type}/{endpoint}". 69 --path=/etc/ssl/certs/https/server.pem --unit=bmcweb.service 73 object path is "/xyz/openbmc_project/certs/server/https".
|
/openbmc/qemu/scripts/ci/gitlab-kubernetes-runners/ |
H A D | values.yaml | 13 "DOCKER_TLS_CERTDIR=/certs", 15 "DOCKER_CERT_PATH=/certs/client" 26 name = "docker-certs" 27 mount_path = "/certs/client"
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/freeradius/files/ |
H A D | 0015-bootstrap-check-commands-of-openssl-exist.patch | 20 raddb/certs/bootstrap | 8 ++++++++ 23 diff --git a/raddb/certs/bootstrap b/raddb/certs/bootstrap 25 --- a/raddb/certs/bootstrap 26 +++ b/raddb/certs/bootstrap
|
H A D | 0012-raddb-certs-Makefile-fix-the-existed-certificate-err.patch | 4 Subject: [PATCH] raddb/certs/Makefile: fix the existed certificate error 28 raddb/certs/Makefile | 4 ++-- 31 diff --git a/raddb/certs/Makefile b/raddb/certs/Makefile 33 --- a/raddb/certs/Makefile 34 +++ b/raddb/certs/Makefile
|
H A D | 0013-raddb-certs-Makefile-fix-the-occasional-verification.patch | 4 Subject: [PATCH] raddb/certs/Makefile: fix the occasional verification failure 7 # cd /etc/raddb/certs 28 raddb/certs/Makefile | 30 +++++++++++++++--------------- 31 diff --git a/raddb/certs/Makefile b/raddb/certs/Makefile 33 --- a/raddb/certs/Makefile 34 +++ b/raddb/certs/Makefile
|
H A D | freeradius | 36 if [ ! -f /etc/raddb/certs/server.pem ]; then 38 if sudo -u radiusd /etc/raddb/certs/bootstrap 1> /dev/null 2> /dev/null; then
|
/openbmc/phosphor-certificate-manager/test/ |
H A D | certs_manager_test.cpp | 36 namespace phosphor::certs namespace 245 phosphor::certs::CSR* csr_; 333 ASSERT_EQ(certs.size(), 1); in TEST_F() 335 EXPECT_EQ(certs.front()->validNotAfter() - certs.front()->validNotBefore(), in TEST_F() 490 EXPECT_EQ(certs.size(), 2); in TEST_F() 753 EXPECT_EQ(certs.size(), 3); in TEST_F() 759 certs[0]->delete_(); in TEST_F() 760 EXPECT_EQ(certs.size(), 2); in TEST_F() 762 certs[0]->delete_(); in TEST_F() 763 EXPECT_EQ(certs.size(), 1); in TEST_F() [all …]
|
H A D | meson.build | 39 'test-certs-manager', 48 timeout: 500, # Takes about 1 minute to generate all the certs. 56 'test-ca-certs-manager',
|
/openbmc/linux/crypto/asymmetric_keys/ |
H A D | pkcs7_parser.c | 63 while (pkcs7->certs) { in pkcs7_free_message() 64 cert = pkcs7->certs; in pkcs7_free_message() 65 pkcs7->certs = cert->next; in pkcs7_free_message() 136 ctx->ppcerts = &ctx->certs; in pkcs7_parse_message() 156 while (ctx->certs) { in pkcs7_parse_message() 157 struct x509_certificate *cert = ctx->certs; in pkcs7_parse_message() 158 ctx->certs = cert->next; in pkcs7_parse_message() 450 *ctx->ppcerts = ctx->msg->certs; in pkcs7_note_certificate_list() 451 ctx->msg->certs = ctx->certs; in pkcs7_note_certificate_list() 452 ctx->certs = NULL; in pkcs7_note_certificate_list() [all …]
|
H A D | verify_pefile.c | 94 (unsigned long)&ddir->certs - (unsigned long)pebuf; in pefile_parse_binary() 95 ctx->certs_size = ddir->certs.size; in pefile_parse_binary() 97 if (!ddir->certs.virtual_address || !ddir->certs.size) { in pefile_parse_binary() 102 chkaddr(ctx->header_size, ddir->certs.virtual_address, in pefile_parse_binary() 103 ddir->certs.size); in pefile_parse_binary() 104 ctx->sig_offset = ddir->certs.virtual_address; in pefile_parse_binary() 105 ctx->sig_len = ddir->certs.size; in pefile_parse_binary()
|
/openbmc/phosphor-certificate-manager/dist/ |
H A D | meson.build | 7 certs = [] variable 19 certs += 'env/bmcweb' 28 certs += 'env/authority' 46 certs,
|
/openbmc/phosphor-user-manager/ |
H A D | nslcd | 2 #example: /xyz/openbmc_project/certs/client/ldap 6 CERTPATH=/etc/nslcd/certs/cert.pem
|
/openbmc/phosphor-certificate-manager/dist/env/ |
H A D | authority | 2 #example: /xyz/openbmc_project/certs/authority/truststore 6 CERTPATH=/etc/ssl/certs/authority
|
H A D | bmcweb | 2 #example: /xyz/openbmc_project/certs/server/https 6 CERTPATH=/etc/ssl/certs/https/server.pem
|
/openbmc/openbmc/poky/meta/recipes-core/meta/ |
H A D | buildtools-tarball.bb | 76 if [ -e "${SDK_OUTPUT}${SDKPATHNATIVE}${sysconfdir}/ssl/certs/ca-certificates.crt" ]; then 77 …echo 'export GIT_SSL_CAINFO="${SDKPATHNATIVE}${sysconfdir}/ssl/certs/ca-certificates.crt"' >>$scri… 78 …echo 'export SSL_CERT_FILE="${SDKPATHNATIVE}${sysconfdir}/ssl/certs/ca-certificates.crt"' >>$script 79 …echo 'export REQUESTS_CA_BUNDLE="${SDKPATHNATIVE}${sysconfdir}/ssl/certs/ca-certificates.crt"' >>$… 80 …echo 'export CURL_CA_BUNDLE="${SDKPATHNATIVE}${sysconfdir}/ssl/certs/ca-certificates.crt"' >>$scri…
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/ |
H A D | README.md | 19 - The URI /xyz/openbmc_project/certs/server/https maps to instance of the 21 - The URI /xyz/openbmc_project/certs/client/ldap maps to instance of the 23 - The URI /xyz/openbmc_project/certs/authority/truststore maps to instance of 44 url: /xyz/openbmc_project/certs/server/https 48 url: /xyz/openbmc_project/certs/server/https/<cert_id> 52 url: /xyz/openbmc_project/certs/client/ldap 56 url: /xyz/openbmc_project/certs/client/ldap/<cert_id> 203 /xyz/openbmc_project/certs/server/https. 218 e.g: /xyz/openbmc_project/certs/server/https/1 is mapped to 231 /xyz/openbmc_project/certs/server/https/1.
|
/openbmc/openbmc/meta-security/recipes-ids/samhain/files/ |
H A D | samhain-samhainrc.patch | 38 -file = /etc/cups/certs 39 -file = /etc/cups/certs/0 90 -file = /var/lib/cups/certs 91 -file = /var/lib/cups/certs/0
|
/openbmc/openbmc/poky/meta/recipes-support/ca-certificates/ca-certificates/ |
H A D | 0002-update-ca-certificates-use-SYSROOT.patch | 28 -ETCCERTSDIR=/etc/ssl/certs 30 +ETCCERTSDIR=$SYSROOT/etc/ssl/certs
|