/openbmc/linux/drivers/media/platform/chips-media/ |
H A D | coda-gdi.c | 79 RBC(CA, 0, CA, 0), 80 RBC(CA, 1, CA, 1), 81 RBC(CA, 2, CA, 2), 82 RBC(CA, 3, CA, 3), 83 RBC(CA, 4, CA, 8), 84 RBC(CA, 8, CA, 9), 85 RBC(CA, 9, CA, 10), 86 RBC(CA, 10, CA, 11), 87 RBC(CA, 11, CA, 12), 88 RBC(CA, 12, CA, 13), [all …]
|
/openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/libmozilla/ |
H A D | libmozilla-ca-perl_20240924.bb | 1 SUMMARY = "Mozilla's CA cert bundle in PEM format" 2 DESCRIPTION = "Mozilla::CA provides a copy of Mozilla's bundle of \ 5 HOMEPAGE = "https://metacpan.org/pod/Mozilla::CA" 6 BUGTRACKER = "https://github.com/libwww-perl/Mozilla-CA/issues" 12 SRC_URI = "${CPAN_MIRROR}/authors/id/L/LW/LWP/Mozilla-CA-${PV}.tar.gz" 15 S = "${WORKDIR}/Mozilla-CA-${PV}"
|
/openbmc/docs/security/ |
H A D | TLS-configuration.md | 14 certificates signed by a CA that can be used to authenticate user requests to an 32 - issuer name has to match CA's subject name for client certificate 118 ### Create a new CA certificate 120 First we need to create a private key to sign the CA certificate. 123 openssl genrsa -out CA-key.pem 2048 126 Now we can create a CA certificate, using the previously generated key. You will 131 openssl req -new -config openssl-client.cnf -key CA-key.pem -x509 -days 1000 -out CA-cert.pem 134 ### Create client certificate signed by given CA certificate 147 You will be prompted for the same information as during CA generation, but 155 Sign the certificate using your `CA-cert.pem` certificate with following [all …]
|
/openbmc/openbmc-test-automation/redfish/managers/ |
H A D | test_certificate.robot | 49 Verify CA Certificate Replace 50 [Documentation] Verify CA certificate replace. 55 CA Valid Certificate ok 56 CA Empty Certificate error 71 Verify CA Certificate Install 72 [Documentation] Verify CA certificate install. 77 CA Valid Certificate ok 78 CA Empty Certificate error 81 Verify Maximum CA Certificate Install 82 [Documentation] Verify maximum CA certificate install. [all …]
|
/openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
H A D | test_redfishtool_certificate.robot | 45 Verify Redfishtool Replace CA Certificate Valid Cert 46 [Documentation] Verify replace CA certificate. 49 Verify Redfishtool Replace Certificate CA Valid Certificate ok 59 Verify Redfishtool CA Certificate Install Valid Cert 60 [Documentation] Verify CA Certificate installation. 63 Verify Redfishtool Install Certificate CA Valid Certificate ok 86 Verify Redfishtool Replace CA Certificate Errors 87 [Documentation] Verify error while replacing invalid CA certificate. 91 CA Empty Certificate error 104 Verify Redfishtool CA Certificate Install Errors [all …]
|
/openbmc/docs/designs/ |
H A D | redfish-tls-user-authentication.md | 21 SSL certificates provides validity periods, ability to revoke access from CA 47 Whenever `CA`'s certificate changes `User` shall provide `Redfish` with it. 50 proper `user`'s certificate from `CA`. After this certificate is acquired, 55 │CA│ │User│ │Redfish│ 57 │ Request CA's certificate │ │ 60 │ Return CA's certificate │ │ 63 │ │ Upload CA Certificate │ 93 │CA│ │User│ │Redfish│ 99 #### Uploading CA Certificate 101 CA's certificates for user authentication are kept at [all …]
|
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_multiple_interfaces.robot | 51 ${bmc_url_1} CA ${CA_FILE_PATH} 74 # (e.g. "LDAP Certificate" or "CA Certificate"). 78 Run Keyword If '${certificate_type}' == 'CA' and '${delete_cert}' == '${True}' 79 ... Delete All CA Certificate Via Redfish 90 Run Keyword If '${certificate_type}' == 'CA' 91 ... Select From List By Label ${xpath_certificate_type} CA Certificate 100 Run Keyword If '${certificate_type}' == 'CA' 101 ... Wait Until Page Contains Successfully added CA Certificate.
|
H A D | test_certificates_sub_menu.robot | 79 Verify Installed CA Certificate 80 [Documentation] Install CA certificate and verify the same via GUI. 83 Delete All CA Certificate Via Redfish 85 # Install CA certificate via Redfish. 86 ${file_data}= Generate Certificate File Data CA 87 Install And Verify Certificate Via Redfish CA Valid Certificate ok 89 # Refresh GUI and verify CA certificate availability in GUI. 91 Wait Until Page Contains CA Certificate timeout=10 132 # cert_type Certificate type (e.g. "Client" or "CA"). 136 ... ELSE IF '${cert_type}' == 'CA'
|
/openbmc/openbmc/meta-security/meta-integrity/scripts/ |
H A D | ima-gen-CA-signed.sh | 18 CA=${1:-ima-local-ca.pem} 34 basicConstraints=critical,CA:FALSE 48 -CA $CA -CAkey $CAKEY -CAcreateserial \
|
/openbmc/openbmc/meta-security/meta-integrity/data/debug-keys/ |
H A D | README.md | 5 - ima-local-ca.priv: The CA's private key (password: 1234) 6 - ima-local-ca.pem: The CA's self-signed certificate 10 The CA's (self-signed) certificate can be used to verify the validity of 11 the x509_ima.der certificate. Since the CA certificate will be built into
|
/openbmc/openbmc-test-automation/docs/ |
H A D | certificate_generate.md | 1 ## Steps to create and install CA signed certificate 3 To create and install a CA signed server certificate, follow these steps: 9 C. Create CA signed server certificate using CSR request 11 D. Install CA signed server certificate 15 1. Create private key for certificate authority(CA). 22 2. Create a root CA certificate using the private key created in step 1. 116 **Create CA signed server certificate using CSR request** 118 1. Use BMC generated CSR request (device.csr) to generate CA signed certificate 122 openssl x509 -req -in device.csr -CA rootCA.pem -CAkey rootCA.key -CAcreateserial -out device.crt -… 142 **Install CA signed server certificate** [all …]
|
/openbmc/docs/designs/management-console/ |
H A D | VMI_Certificate_Exchange.md | 27 HMC requires client key, client.crt, and CA.crt to establish secure connection 38 Management console needs an API through which it can send the CSR to VMI (CA) 39 and gets the signed certificate and the CA certificate from VMI. This design 54 - VMI acts as root CA only for VMI endpoints, its not an official CA and uses 66 The management console can send CSR string to VMI (CA) and get signed 67 certificate and Root CA certificate via proposed BMC interface. 81 | (client) | | | | (CA) | 97 CA.crt | | 142 Response: This will return the certificate string which contains and root CA 165 - CSR certificate is passed onto the CA to sign the certificate and then upload [all …]
|
/openbmc/linux/arch/arm/boot/dts/broadcom/ |
H A D | bcm47094-luxul-xap-1610.dts | 81 brcm,ccode-map = "AU-AU-920", "CA-CA-892", "GB-DE-964", "NZ-AU-920", "US-US-825"; 99 brcm,ccode-map = "AU-AU-920", "CA-CA-892", "GB-DE-964", "NZ-AU-920", "US-US-825";
|
H A D | bcm47094-luxul-xwr-3150-v1.dts | 97 brcm,ccode-map = "AU-AU-953", "CA-CA-946", "GB-E0-846", "NZ-AU-953", "US-Q2-930"; 115 brcm,ccode-map = "AU-AU-953", "CA-CA-946", "GB-E0-846", "NZ-AU-953", "US-Q2-930";
|
/openbmc/linux/Documentation/userspace-api/media/dvb/ |
H A D | ca-fclose.rst | 7 Digital TV CA close() 13 Digital TV CA close() 29 This system call closes a previously opened CA device.
|
H A D | ca-fopen.rst | 7 Digital TV CA open() 13 Digital TV CA open() 24 Name of specific Digital TV CA device. 59 Only one user can open the CA Device in ``O_RDWR`` mode. All other
|
H A D | ca.rst | 6 Digital TV CA Device 9 The Digital TV CA device controls the conditional access hardware. It
|
/openbmc/openbmc/poky/meta/recipes-devtools/python/ |
H A D | python3-certifi_2024.8.30.bb | 1 SUMMARY = "Python package for providing Mozilla's CA Bundle." 2 DESCRIPTION = "This installable Python package contains a CA Bundle that you can reference in your \ 3 Python code. This is useful for verifying HTTP requests, for example. This is the same CA Bundle \
|
/openbmc/openbmc-test-automation/lib/ |
H A D | certificate_utils.robot | 67 # cert_type Certificate type (e.g. "Client" or "CA"). 165 Delete All CA Certificate Via Redfish 166 [Documentation] Delete all CA certificate via Redfish. 180 # cert_type Certificate type (e.g. "Client" or "CA"). 186 ... ELSE IF '${cert_type}' == 'CA' 212 # Install certificate before replacing client or CA certificate. 215 ... ELSE IF '${cert_type}' == 'CA' 232 ... '${cert_type}' == 'CA' ${REDFISH_CA_CERTIFICATE_URI}/${cert_id} 257 # cert_type Certificate type (e.g. "Client" or "CA"). 264 Run Keyword If '${cert_type}' == 'CA' and '${delete_cert}' == '${True}' [all …]
|
/openbmc/linux/security/integrity/ |
H A D | Kconfig | 78 bool "Enforce Machine Keyring CA Restrictions" 82 The .machine keyring can be configured to enforce CA restriction 85 If enabled only CA keys are added to the machine keyring, all 89 bool "Only CA keys without DigitialSignature usage set" 93 When selected, only load CA keys are loaded into the machine 94 keyring that contain the CA bit set along with the keyCertSign
|
/openbmc/phosphor-user-manager/docs/ |
H A D | README.md | 24 certificate and the CA certificate in following cases. 27 - Change the already configured Client/CA certificate 36 #### Upload CA Certificate
|
/openbmc/openbmc/meta-google/recipes-google/default-ca-dev/ |
H A D | default-ca-dev.bb | 1 SUMMARY = "Add dev default CA" 2 DESCRIPTION = "Add dev default CA"
|
/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | CATOSL-1.1 | 11 Computer Associates International, Inc. (CA) believes in open source. We believe that the open sour… 19 …ontribution means (a) in the case of CA, the Original Program; and (b) in the case of each Contrib… 21 1.2 Contributor means CA and any other person or entity that distributes the Program. 29 …rsion of the software to which this License is attached and as released by CA, including source co… 63 …CA in writing at Computer Associates International, Inc., One Computer Associates Plaza, Islandia,… 65 3.6 Recipient shall not remove, obscure, or modify any CA or other Contributor copyright or patent … 85 … to CA (collectively CA Marks) or to any trademark, service mark, logo or trade name belonging to … 95 …CA retains all rights, title and interest in and to the Original Program and any Contributions mad… 105 …CA may publish new versions (including revisions) of this License from time to time. Each new vers… 109 …lution between a Recipient and CA relating to this License shall take place in the State of New Yo…
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/xrdp/xrdp/ |
H A D | 0001-Added-req_distinguished_name-in-etc-xrdp-openssl.con.patch | 24 +#stateOrProvinceName = CA 32 # Extensions for a typical CA - PKIX recommendation.
|
/openbmc/openbmc/meta-security/meta-integrity/ |
H A D | README.md | 125 # 1. Keys signed by a new CA. 126 # When asked for a PEM passphrase, that will be for the root CA. 132 # $INTEGRITY_BASE/scripts/ima-gen-CA-signed.sh 134 # 2. Keys signed by an existing CA. 135 # $INTEGRITY_BASE/scripts/ima-gen-CA-signed.sh <CA.pem> <CA.priv> 138 The ``ima-gen-local-ca.sh`` and ``ima-gen.sh`` scripts create a root CA 140 supports adding tha CA's public key to the kernel's system keyring by 142 that is necessary (for example, the CA might also get added to the
|