Searched hist:"2 f3563cc53a8f32c43b03d20b7219e52b1c1cf28" (Results 1 – 5 of 5) sorted by relevance
/openbmc/phosphor-certificate-manager/ |
H A D | certificate.hpp | diff 2f3563cc53a8f32c43b03d20b7219e52b1c1cf28 Wed Jan 08 05:35:23 CST 2020 Zbigniew Lukwinski <zbigniew.lukwinski@linux.intel.com> Refactoring of certificates managing and storing
This commit is about third stage code refactoring proposed by Zbigniew Kurzynski (zbigniew.kurzynski@intel.com) on the mailing list ("phosphor-certificate-manager refactoring"): "Changing the way of managing and storing TrustStore certificates".
Following changes are being implemented: - each certificate has its own and unique ID, - authority certificates are kept in files with random names under /etc/ssl/certs/authority and symlinks (based on subject name hash) are created to satisfy OpenSSL library, - restarting bmcweb was moved from certificate class to certs_manager class - certificate uniqueness is based on certificate ID and checked while installing and replacing operation in certs_manager class.
Tested by doing installing/replacing/removing operations on certificate storage using RedFish API.
Signed-off-by: Zbigniew Lukwinski <zbigniew.lukwinski@linux.intel.com> Change-Id: I0b02a10b940279c46ad9ee07925794262133b1b0
|
H A D | certs_manager.hpp | diff 2f3563cc53a8f32c43b03d20b7219e52b1c1cf28 Wed Jan 08 05:35:23 CST 2020 Zbigniew Lukwinski <zbigniew.lukwinski@linux.intel.com> Refactoring of certificates managing and storing
This commit is about third stage code refactoring proposed by Zbigniew Kurzynski (zbigniew.kurzynski@intel.com) on the mailing list ("phosphor-certificate-manager refactoring"): "Changing the way of managing and storing TrustStore certificates".
Following changes are being implemented: - each certificate has its own and unique ID, - authority certificates are kept in files with random names under /etc/ssl/certs/authority and symlinks (based on subject name hash) are created to satisfy OpenSSL library, - restarting bmcweb was moved from certificate class to certs_manager class - certificate uniqueness is based on certificate ID and checked while installing and replacing operation in certs_manager class.
Tested by doing installing/replacing/removing operations on certificate storage using RedFish API.
Signed-off-by: Zbigniew Lukwinski <zbigniew.lukwinski@linux.intel.com> Change-Id: I0b02a10b940279c46ad9ee07925794262133b1b0
|
H A D | certificate.cpp | diff 2f3563cc53a8f32c43b03d20b7219e52b1c1cf28 Wed Jan 08 05:35:23 CST 2020 Zbigniew Lukwinski <zbigniew.lukwinski@linux.intel.com> Refactoring of certificates managing and storing
This commit is about third stage code refactoring proposed by Zbigniew Kurzynski (zbigniew.kurzynski@intel.com) on the mailing list ("phosphor-certificate-manager refactoring"): "Changing the way of managing and storing TrustStore certificates".
Following changes are being implemented: - each certificate has its own and unique ID, - authority certificates are kept in files with random names under /etc/ssl/certs/authority and symlinks (based on subject name hash) are created to satisfy OpenSSL library, - restarting bmcweb was moved from certificate class to certs_manager class - certificate uniqueness is based on certificate ID and checked while installing and replacing operation in certs_manager class.
Tested by doing installing/replacing/removing operations on certificate storage using RedFish API.
Signed-off-by: Zbigniew Lukwinski <zbigniew.lukwinski@linux.intel.com> Change-Id: I0b02a10b940279c46ad9ee07925794262133b1b0
|
H A D | certs_manager.cpp | diff 2f3563cc53a8f32c43b03d20b7219e52b1c1cf28 Wed Jan 08 05:35:23 CST 2020 Zbigniew Lukwinski <zbigniew.lukwinski@linux.intel.com> Refactoring of certificates managing and storing
This commit is about third stage code refactoring proposed by Zbigniew Kurzynski (zbigniew.kurzynski@intel.com) on the mailing list ("phosphor-certificate-manager refactoring"): "Changing the way of managing and storing TrustStore certificates".
Following changes are being implemented: - each certificate has its own and unique ID, - authority certificates are kept in files with random names under /etc/ssl/certs/authority and symlinks (based on subject name hash) are created to satisfy OpenSSL library, - restarting bmcweb was moved from certificate class to certs_manager class - certificate uniqueness is based on certificate ID and checked while installing and replacing operation in certs_manager class.
Tested by doing installing/replacing/removing operations on certificate storage using RedFish API.
Signed-off-by: Zbigniew Lukwinski <zbigniew.lukwinski@linux.intel.com> Change-Id: I0b02a10b940279c46ad9ee07925794262133b1b0
|
/openbmc/phosphor-certificate-manager/test/ |
H A D | certs_manager_test.cpp | diff 2f3563cc53a8f32c43b03d20b7219e52b1c1cf28 Wed Jan 08 05:35:23 CST 2020 Zbigniew Lukwinski <zbigniew.lukwinski@linux.intel.com> Refactoring of certificates managing and storing
This commit is about third stage code refactoring proposed by Zbigniew Kurzynski (zbigniew.kurzynski@intel.com) on the mailing list ("phosphor-certificate-manager refactoring"): "Changing the way of managing and storing TrustStore certificates".
Following changes are being implemented: - each certificate has its own and unique ID, - authority certificates are kept in files with random names under /etc/ssl/certs/authority and symlinks (based on subject name hash) are created to satisfy OpenSSL library, - restarting bmcweb was moved from certificate class to certs_manager class - certificate uniqueness is based on certificate ID and checked while installing and replacing operation in certs_manager class.
Tested by doing installing/replacing/removing operations on certificate storage using RedFish API.
Signed-off-by: Zbigniew Lukwinski <zbigniew.lukwinski@linux.intel.com> Change-Id: I0b02a10b940279c46ad9ee07925794262133b1b0
|