/openbmc/qemu/hw/uefi/ |
H A D | var-service-pkcs7.c | 173 static int build_digest_authvar(gnutls_x509_crt_t signer, in build_digest_authvar() argument 184 /* get signer CN */ in build_digest_authvar() 185 rc = gnutls_x509_crt_get_dn_by_oid(signer, GNUTLS_OID_X520_COMMON_NAME, in build_digest_authvar() 194 rc = gnutls_x509_crt_get_dn_by_oid(signer, GNUTLS_OID_X520_COMMON_NAME, in build_digest_authvar() 244 * chain, and the subject CN of the signer certificate. 256 gnutls_x509_crt_t signer = NULL; in build_trust_list_authvar() local 263 /* first is signer certificate */ in build_trust_list_authvar() 270 rc = gnutls_x509_crt_init(&signer); in build_trust_list_authvar() 275 rc = gnutls_x509_crt_import(signer, &signer_data, GNUTLS_X509_FMT_DER); in build_trust_list_authvar() 279 gnutls_x509_crt_deinit(signer); in build_trust_list_authvar() [all …]
|
/openbmc/linux/crypto/asymmetric_keys/ |
H A D | pkcs7_trust.c | 38 for (x509 = sinfo->signer; x509; x509 = x509->signer) { in pkcs7_validate_trust_one() 68 if (x509->signer == x509) { in pkcs7_validate_trust_one() 78 /* No match - see if the root certificate has a signer amongst the in pkcs7_validate_trust_one() 88 pr_devel("sinfo %u: Root cert %u signer is key %x\n", in pkcs7_validate_trust_one() 102 pr_devel("sinfo %u: Direct signer is key %x\n", in pkcs7_validate_trust_one() 127 for (p = sinfo->signer; p != x509; p = p->signer) in pkcs7_validate_trust_one()
|
H A D | pkcs7_verify.c | 177 sinfo->signer = x509; in pkcs7_find_key() 197 struct x509_certificate *x509 = sinfo->signer, *p; in pkcs7_verify_sig_chain() 217 for (p = sinfo->signer; p != x509; p = p->signer) in pkcs7_verify_sig_chain() 240 x509->signer = x509; in pkcs7_verify_sig_chain() 294 x509->signer = p; in pkcs7_verify_sig_chain() 335 if (!sinfo->signer) in pkcs7_verify_one() 339 sinfo->signer->index, sinfo->index); in pkcs7_verify_one() 346 if (sinfo->signing_time < sinfo->signer->valid_from || in pkcs7_verify_one() 347 sinfo->signing_time > sinfo->signer->valid_to) { in pkcs7_verify_one() 354 ret = public_key_verify_signature(sinfo->signer->pub, sinfo->sig); in pkcs7_verify_one()
|
H A D | x509_parser.h | 14 struct x509_certificate *signer; /* Certificate that signed this one */ member
|
H A D | pkcs7_parser.h | 19 struct x509_certificate *signer; /* Signing certificate (in msg->certs) */ member
|
H A D | pkcs7.asn1 | 63 -- Signer information
|
/openbmc/openbmc/poky/meta/recipes-core/meta/ |
H A D | signing-keys.bb | 28 signer = get_signer(d, d.getVar('RPM_GPG_BACKEND')) 29 signer.export_pubkey(os.path.join(d.expand('${B}'), 'rpm-key'), 34 signer = get_signer(d, d.getVar('IPK_GPG_BACKEND')) 35 signer.export_pubkey(os.path.join(d.expand('${B}'), 'ipk-key'), 40 signer = get_signer(d, d.getVar('PACKAGE_FEED_GPG_BACKEND')) 41 signer.export_pubkey(os.path.join(d.expand('${B}'), 'pf-key'),
|
/openbmc/u-boot/doc/uImage.FIT/ |
H A D | verified-boot.txt | 25 Images are signed using a private key known only to the signer, but can 46 | signer | * | U-Boot | 62 The public key from the signer allows us to verify and therefore trust 73 The above method works for a signer providing images to a run-time U-Boot. 76 1. Master private key is used by the signer to sign a first-stage image.
|
H A D | signature.txt | 84 allow the signer to operate. These should be added to the .its file. 103 - signer-name: Name of the signer (e.g. "mkimage") 105 - signer-version: Version string of the signer (e.g. "2013.01") 107 - comment: Additional information about the signer or image 119 For config bindings, these properties are added by the signer: 121 - hashed-nodes: A list of nodes which were hashed by the signer. Each is
|
/openbmc/linux/scripts/ |
H A D | extract-module-sig.pl | 12 # -n: Just the signer's name 105 print STDERR "Found $name_len bytes of signer's name [$raw_name]\n"; 123 # Just the signer's name 124 print STDERR "No signer's name for PKCS#7 message type sig\n"
|
H A D | get_maintainer.pl | 1062 --roles => show roles (status:subsystem, git-signer, list, etc...) 1577 foreach my $signer (@signature_lines) { 1578 $signer = deduplicate_email($signer); 1760 foreach my $signer (@commit_signers) { 1761 $signer = deduplicate_email($signer); 1909 if ($list[$i]->[1] =~ /^(author|commit|signer)/i); 2136 my $signer = $signers[0]; 2138 $signer = deduplicate_email($signer); 2141 foreach my $ref(@{$commit_signer_hash{$signer}}) { 2150 push(@{$commit_signer_hash{$signer}}, [all …]
|
/openbmc/linux/include/linux/ |
H A D | module_signature.h | 28 * - Signer's name 37 u8 signer_len; /* Length of signer's name [0] */
|
/openbmc/openbmc/poky/meta/classes/ |
H A D | sign_ipk.bbclass | 51 signer = get_signer(d, d.getVar('IPK_GPG_BACKEND')) 55 signer.detach_sign(ipk_to_sign,
|
H A D | sign_rpm.bbclass | 62 signer = get_signer(d, d.getVar('RPM_GPG_BACKEND')) 65 signer.sign_rpms(rpms,
|
/openbmc/openbmc/poky/meta/lib/oe/package_manager/rpm/ |
H A D | __init__.py | 17 signer = get_signer(self.d, self.d.getVar('PACKAGE_FEED_GPG_BACKEND')) 19 signer = None 27 if signer: 30 signer.detach_sign(os.path.join(deploy_dir, 'repodata', 'repomd.xml'), 132 signer = get_signer(self.d, self.d.getVar('RPM_GPG_BACKEND')) 134 signer.export_pubkey(pubkey_path, self.d.getVar('RPM_GPG_NAME'))
|
/openbmc/qemu/scripts/ |
H A D | get_maintainer.pl | 730 --roles => show roles (status:subsystem, git-signer, list, etc...) 1251 foreach my $signer (@signature_lines) { 1252 $signer = deduplicate_email($signer); 1538 if ($list[$i]->[1] =~ /^(author|commit|signer)/i); 1765 my $signer = $signers[0]; 1767 $signer = deduplicate_email($signer); 1770 foreach my $ref(@{$commit_signer_hash{$signer}}) { 1779 push(@{$commit_signer_hash{$signer}}, 1842 foreach my $signer (@signers) { 1843 $signer = deduplicate_email($signer); [all …]
|
/openbmc/openbmc-tools/cla-signers/ |
H A D | README.md | 1 # Greppable CLA signer list
|
/openbmc/u-boot/scripts/ |
H A D | get_maintainer.pl | 1002 --roles => show roles (status:subsystem, git-signer, list, etc...) 1538 foreach my $signer (@signature_lines) { 1539 $signer = deduplicate_email($signer); 1844 if ($list[$i]->[1] =~ /^(author|commit|signer)/i); 2071 my $signer = $signers[0]; 2073 $signer = deduplicate_email($signer); 2076 foreach my $ref(@{$commit_signer_hash{$signer}}) { 2085 push(@{$commit_signer_hash{$signer}}, 2160 foreach my $signer (@signers) { 2161 $signer = deduplicate_email($signer); [all …]
|
/openbmc/openbmc/poky/meta/lib/oe/package_manager/ipk/ |
H A D | __init__.py | 22 signer = get_signer(self.d, self.d.getVar('PACKAGE_FEED_GPG_BACKEND')) 24 signer = None 57 if signer: 61 signer.detach_sign(f,
|
/openbmc/openbmc/poky/meta/lib/oe/package_manager/deb/ |
H A D | __init__.py | 87 signer = get_signer(self.d, self.d.getVar('PACKAGE_FEED_GPG_BACKEND')) 89 signer = None 90 if signer: 92 signer.detach_sign(f,
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Attestation/ |
H A D | MeasurementSet.interface.yaml | 49 signer.
|
/openbmc/openbmc/meta-security/recipes-security/opendnssec/ |
H A D | opendnssec_2.1.10.bb | 1 SUMMARY = "OpenDNSSEC is a policy-based zone signer that automates the process of keeping track of …
|
/openbmc/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | verify_pkcs7_sig.c | 37 * - Signer's name 46 __u8 signer_len; /* Length of signer's name [0] */
|
/openbmc/linux/tools/certs/ |
H A D | print-cert-tbs-hash.sh | 17 # -signer builtin-certificate.pem -certfile certificate-chain.pem \
|
/openbmc/u-boot/tools/ |
H A D | image-host.c | 95 * This writes the signature and signer data to the FIT. 122 ret = fdt_setprop_string(fit, noffset, "signer-name", in fit_image_write_sig() 126 ret = fdt_setprop_string(fit, noffset, "signer-version", in fit_image_write_sig()
|