Home
last modified time | relevance | path

Searched refs:CA (Results 1 – 25 of 137) sorted by relevance

123456

/openbmc/linux/drivers/media/platform/chips-media/
H A Dcoda-gdi.c79 RBC(CA, 0, CA, 0),
80 RBC(CA, 1, CA, 1),
81 RBC(CA, 2, CA, 2),
82 RBC(CA, 3, CA, 3),
83 RBC(CA, 4, CA, 8),
84 RBC(CA, 8, CA, 9),
85 RBC(CA, 9, CA, 10),
86 RBC(CA, 10, CA, 11),
87 RBC(CA, 11, CA, 12),
88 RBC(CA, 12, CA, 13),
[all …]
/openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/libmozilla/
H A Dlibmozilla-ca-perl_20240924.bb1 SUMMARY = "Mozilla's CA cert bundle in PEM format"
2 DESCRIPTION = "Mozilla::CA provides a copy of Mozilla's bundle of \
5 HOMEPAGE = "https://metacpan.org/pod/Mozilla::CA"
6 BUGTRACKER = "https://github.com/libwww-perl/Mozilla-CA/issues"
12 SRC_URI = "${CPAN_MIRROR}/authors/id/L/LW/LWP/Mozilla-CA-${PV}.tar.gz"
15 S = "${WORKDIR}/Mozilla-CA-${PV}"
/openbmc/docs/security/
H A DTLS-configuration.md14 certificates signed by a CA that can be used to authenticate user requests to an
32 - issuer name has to match CA's subject name for client certificate
118 ### Create a new CA certificate
120 First we need to create a private key to sign the CA certificate.
123 openssl genrsa -out CA-key.pem 2048
126 Now we can create a CA certificate, using the previously generated key. You will
131 openssl req -new -config openssl-client.cnf -key CA-key.pem -x509 -days 1000 -out CA-cert.pem
134 ### Create client certificate signed by given CA certificate
147 You will be prompted for the same information as during CA generation, but
155 Sign the certificate using your `CA-cert.pem` certificate with following
[all …]
/openbmc/openbmc-test-automation/redfish/managers/
H A Dtest_certificate.robot49 Verify CA Certificate Replace
50 [Documentation] Verify CA certificate replace.
55 CA Valid Certificate ok
56 CA Empty Certificate error
71 Verify CA Certificate Install
72 [Documentation] Verify CA certificate install.
77 CA Valid Certificate ok
78 CA Empty Certificate error
81 Verify Maximum CA Certificate Install
82 [Documentation] Verify maximum CA certificate install.
[all …]
/openbmc/openbmc-test-automation/redfish/dmtf_tools/
H A Dtest_redfishtool_certificate.robot45 Verify Redfishtool Replace CA Certificate Valid Cert
46 [Documentation] Verify replace CA certificate.
49 Verify Redfishtool Replace Certificate CA Valid Certificate ok
59 Verify Redfishtool CA Certificate Install Valid Cert
60 [Documentation] Verify CA Certificate installation.
63 Verify Redfishtool Install Certificate CA Valid Certificate ok
86 Verify Redfishtool Replace CA Certificate Errors
87 [Documentation] Verify error while replacing invalid CA certificate.
91 CA Empty Certificate error
104 Verify Redfishtool CA Certificate Install Errors
[all …]
/openbmc/docs/designs/
H A Dredfish-tls-user-authentication.md21 SSL certificates provides validity periods, ability to revoke access from CA
47 Whenever `CA`'s certificate changes `User` shall provide `Redfish` with it.
50 proper `user`'s certificate from `CA`. After this certificate is acquired,
55CA│ │User│ │Redfish│
57 │ Request CA's certificate │ │
60 │ Return CA's certificate │ │
63 │ │ Upload CA Certificate │
93CA│ │User│ │Redfish│
99 #### Uploading CA Certificate
101 CA's certificates for user authentication are kept at
[all …]
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/
H A Dtest_multiple_interfaces.robot51 ${bmc_url_1} CA ${CA_FILE_PATH}
74 # (e.g. "LDAP Certificate" or "CA Certificate").
78 Run Keyword If '${certificate_type}' == 'CA' and '${delete_cert}' == '${True}'
79 ... Delete All CA Certificate Via Redfish
90 Run Keyword If '${certificate_type}' == 'CA'
91 ... Select From List By Label ${xpath_certificate_type} CA Certificate
100 Run Keyword If '${certificate_type}' == 'CA'
101 ... Wait Until Page Contains Successfully added CA Certificate.
H A Dtest_certificates_sub_menu.robot79 Verify Installed CA Certificate
80 [Documentation] Install CA certificate and verify the same via GUI.
83 Delete All CA Certificate Via Redfish
85 # Install CA certificate via Redfish.
86 ${file_data}= Generate Certificate File Data CA
87 Install And Verify Certificate Via Redfish CA Valid Certificate ok
89 # Refresh GUI and verify CA certificate availability in GUI.
91 Wait Until Page Contains CA Certificate timeout=10
132 # cert_type Certificate type (e.g. "Client" or "CA").
136 ... ELSE IF '${cert_type}' == 'CA'
/openbmc/openbmc/meta-security/meta-integrity/scripts/
H A Dima-gen-CA-signed.sh18 CA=${1:-ima-local-ca.pem}
34 basicConstraints=critical,CA:FALSE
48 -CA $CA -CAkey $CAKEY -CAcreateserial \
/openbmc/openbmc/meta-security/meta-integrity/data/debug-keys/
H A DREADME.md5 - ima-local-ca.priv: The CA's private key (password: 1234)
6 - ima-local-ca.pem: The CA's self-signed certificate
10 The CA's (self-signed) certificate can be used to verify the validity of
11 the x509_ima.der certificate. Since the CA certificate will be built into
/openbmc/openbmc-test-automation/docs/
H A Dcertificate_generate.md1 ## Steps to create and install CA signed certificate
3 To create and install a CA signed server certificate, follow these steps:
9 C. Create CA signed server certificate using CSR request
11 D. Install CA signed server certificate
15 1. Create private key for certificate authority(CA).
22 2. Create a root CA certificate using the private key created in step 1.
116 **Create CA signed server certificate using CSR request**
118 1. Use BMC generated CSR request (device.csr) to generate CA signed certificate
122 openssl x509 -req -in device.csr -CA rootCA.pem -CAkey rootCA.key -CAcreateserial -out device.crt -…
142 **Install CA signed server certificate**
[all …]
/openbmc/docs/designs/management-console/
H A DVMI_Certificate_Exchange.md27 HMC requires client key, client.crt, and CA.crt to establish secure connection
38 Management console needs an API through which it can send the CSR to VMI (CA)
39 and gets the signed certificate and the CA certificate from VMI. This design
54 - VMI acts as root CA only for VMI endpoints, its not an official CA and uses
66 The management console can send CSR string to VMI (CA) and get signed
67 certificate and Root CA certificate via proposed BMC interface.
81 | (client) | | | | (CA) |
97 CA.crt | |
142 Response: This will return the certificate string which contains and root CA
165 - CSR certificate is passed onto the CA to sign the certificate and then upload
[all …]
/openbmc/linux/arch/arm/boot/dts/broadcom/
H A Dbcm47094-luxul-xap-1610.dts81 brcm,ccode-map = "AU-AU-920", "CA-CA-892", "GB-DE-964", "NZ-AU-920", "US-US-825";
99 brcm,ccode-map = "AU-AU-920", "CA-CA-892", "GB-DE-964", "NZ-AU-920", "US-US-825";
H A Dbcm47094-luxul-xwr-3150-v1.dts97 brcm,ccode-map = "AU-AU-953", "CA-CA-946", "GB-E0-846", "NZ-AU-953", "US-Q2-930";
115 brcm,ccode-map = "AU-AU-953", "CA-CA-946", "GB-E0-846", "NZ-AU-953", "US-Q2-930";
/openbmc/linux/Documentation/userspace-api/media/dvb/
H A Dca-fclose.rst7 Digital TV CA close()
13 Digital TV CA close()
29 This system call closes a previously opened CA device.
H A Dca-fopen.rst7 Digital TV CA open()
13 Digital TV CA open()
24 Name of specific Digital TV CA device.
59 Only one user can open the CA Device in ``O_RDWR`` mode. All other
H A Dca.rst6 Digital TV CA Device
9 The Digital TV CA device controls the conditional access hardware. It
/openbmc/openbmc/poky/meta/recipes-devtools/python/
H A Dpython3-certifi_2024.8.30.bb1 SUMMARY = "Python package for providing Mozilla's CA Bundle."
2 DESCRIPTION = "This installable Python package contains a CA Bundle that you can reference in your \
3 Python code. This is useful for verifying HTTP requests, for example. This is the same CA Bundle \
/openbmc/openbmc-test-automation/lib/
H A Dcertificate_utils.robot67 # cert_type Certificate type (e.g. "Client" or "CA").
165 Delete All CA Certificate Via Redfish
166 [Documentation] Delete all CA certificate via Redfish.
180 # cert_type Certificate type (e.g. "Client" or "CA").
186 ... ELSE IF '${cert_type}' == 'CA'
212 # Install certificate before replacing client or CA certificate.
215 ... ELSE IF '${cert_type}' == 'CA'
232 ... '${cert_type}' == 'CA' ${REDFISH_CA_CERTIFICATE_URI}/${cert_id}
257 # cert_type Certificate type (e.g. "Client" or "CA").
264 Run Keyword If '${cert_type}' == 'CA' and '${delete_cert}' == '${True}'
[all …]
/openbmc/linux/security/integrity/
H A DKconfig78 bool "Enforce Machine Keyring CA Restrictions"
82 The .machine keyring can be configured to enforce CA restriction
85 If enabled only CA keys are added to the machine keyring, all
89 bool "Only CA keys without DigitialSignature usage set"
93 When selected, only load CA keys are loaded into the machine
94 keyring that contain the CA bit set along with the keyCertSign
/openbmc/phosphor-user-manager/docs/
H A DREADME.md24 certificate and the CA certificate in following cases.
27 - Change the already configured Client/CA certificate
36 #### Upload CA Certificate
/openbmc/openbmc/meta-google/recipes-google/default-ca-dev/
H A Ddefault-ca-dev.bb1 SUMMARY = "Add dev default CA"
2 DESCRIPTION = "Add dev default CA"
/openbmc/openbmc/poky/meta/files/common-licenses/
H A DCATOSL-1.111 Computer Associates International, Inc. (CA) believes in open source. We believe that the open sour…
19 …ontribution means (a) in the case of CA, the Original Program; and (b) in the case of each Contrib…
21 1.2 Contributor means CA and any other person or entity that distributes the Program.
29 …rsion of the software to which this License is attached and as released by CA, including source co…
63CA in writing at Computer Associates International, Inc., One Computer Associates Plaza, Islandia,…
65 3.6 Recipient shall not remove, obscure, or modify any CA or other Contributor copyright or patent …
85 … to CA (collectively CA Marks) or to any trademark, service mark, logo or trade name belonging to …
95CA retains all rights, title and interest in and to the Original Program and any Contributions mad…
105CA may publish new versions (including revisions) of this License from time to time. Each new vers…
109 …lution between a Recipient and CA relating to this License shall take place in the State of New Yo…
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/xrdp/xrdp/
H A D0001-Added-req_distinguished_name-in-etc-xrdp-openssl.con.patch24 +#stateOrProvinceName = CA
32 # Extensions for a typical CA - PKIX recommendation.
/openbmc/openbmc/meta-security/meta-integrity/
H A DREADME.md125 # 1. Keys signed by a new CA.
126 # When asked for a PEM passphrase, that will be for the root CA.
132 # $INTEGRITY_BASE/scripts/ima-gen-CA-signed.sh
134 # 2. Keys signed by an existing CA.
135 # $INTEGRITY_BASE/scripts/ima-gen-CA-signed.sh <CA.pem> <CA.priv>
138 The ``ima-gen-local-ca.sh`` and ``ima-gen.sh`` scripts create a root CA
140 supports adding tha CA's public key to the kernel's system keyring by
142 that is necessary (for example, the CA might also get added to the

123456