/openbmc/openbmc/meta-google/recipes-google/default-ca-dev/ |
H A D | default-ca-dev.bb | 6 SRC_URI += "file://certs/authority/" 8 FILES:${PN} = "${sysconfdir}/ssl/certs/authority/*" 11 install -d ${D}${sysconfdir}/ssl/certs/authority 12 install -m 0644 -D ${UNPACKDIR}/certs/authority/* \ 13 ${D}${sysconfdir}/ssl/certs/authority
|
/openbmc/openbmc/meta-phosphor/recipes-phosphor/certificate/ |
H A D | phosphor-certificate-manager_git.bb | 15 PACKAGECONFIG ??= "bmcweb-cert authority-cert" 18 PACKAGECONFIG[authority-cert] = "-Dconfig-authority=enabled,-Dconfig-authority=disabled" 29 …${@bb.utils.contains('PACKAGECONFIG', 'authority-cert', 'phosphor-certificate-manager@authority.se…
|
/openbmc/phosphor-certificate-manager/dist/env/ |
H A D | authority | 2 #example: /xyz/openbmc_project/certs/authority/truststore 6 CERTPATH=/etc/ssl/certs/authority 12 TYPE=authority
|
/openbmc/phosphor-certificate-manager/dist/ |
H A D | meson.build | 26 if get_option('config-authority').allowed() 27 busconfig += 'busconfig/phosphor-authority-cert-config.conf' 28 certs += 'env/authority' 32 'multi-user.target.wants/phosphor-certificate-manager@authority.service',
|
H A D | bmc-vmi-ca-manager.service | 2 Description=BMC VMI CA authority manager 10 BusName=xyz.openbmc_project.Certs.ca.authority.Manager
|
/openbmc/phosphor-certificate-manager/ |
H A D | meson.options | 4 'authority-limit', 23 'config-authority', 25 description: 'Install authority cert configs',
|
H A D | certificate.hpp | 25 authority, enumerator 35 case CertificateType::authority: in certificateTypeToString() 50 return CertificateType::authority; in stringToCertificateType()
|
H A D | certs_manager.cpp | 146 if (certType == CertificateType::authority) in Manager() 175 if (certType != CertificateType::authority) in Manager() 184 if (certType != CertificateType::authority) in Manager() 254 if (certType != CertificateType::authority && !installedCerts.empty()) in install() 258 else if (certType == CertificateType::authority && in install() 285 if (certType != CertificateType::authority) in installAll() 324 for (const auto& authority : authorities) in installAll() local 329 bus, certObjectPath, certType, tempPath, *x509Store, authority, in installAll() 386 if (certType == CertificateType::authority) in deleteAll() 931 if (certType == CertificateType::authority) in createCertificates() [all …]
|
H A D | README.md | 22 Valid types: client,server,authority 42 ./phosphor-certificate-manager --type=authority --endpoint=truststore \ 43 --path=/etc/ssl/certs/authority --unit=bmcweb.service
|
H A D | certificate.cpp | 206 if (certType == CertificateType::authority) in generateCertFilePath() 235 typeFuncMap[CertificateType::authority] = [](const std::string&) {}; in Certificate() 243 appendKeyMap[CertificateType::authority] = [](const std::string&) {}; in Certificate() 395 if (certType != CertificateType::authority) in install() 449 if (certType == CertificateType::authority) in storageUpdate()
|
H A D | meson.build | 37 config_data.set('authority_limit', get_option('authority-limit'))
|
/openbmc/linux/fs/smb/client/ |
H A D | cifsacl.c | 129 id_auth_val = (unsigned long long)sidptr->authority[5]; in sid_to_key_str() 130 id_auth_val |= (unsigned long long)sidptr->authority[4] << 8; in sid_to_key_str() 131 id_auth_val |= (unsigned long long)sidptr->authority[3] << 16; in sid_to_key_str() 132 id_auth_val |= (unsigned long long)sidptr->authority[2] << 24; in sid_to_key_str() 133 id_auth_val |= (unsigned long long)sidptr->authority[1] << 32; in sid_to_key_str() 134 id_auth_val |= (unsigned long long)sidptr->authority[0] << 48; in sid_to_key_str() 179 if (ctsid->authority[i] != cwsid->authority[i]) { in compare_sids() 180 if (ctsid->authority[i] > cwsid->authority[i]) in compare_sids() 238 if (psid->authority[i] != pwell_known_sid->authority[i]) { in is_well_known_sid() 271 dst->authority[i] = src->authority[i]; in cifs_copy_sid() [all …]
|
H A D | cifsacl.h | 70 __u8 authority[NUM_AUTHS]; member
|
/openbmc/docs/designs/ |
H A D | certificate-revocation-list.md | 15 been revoked by the issuing certificate authority (CA) before their actual or 27 authority. 48 authority/server/client certificates, that is, via file path or directory 83 it not only refreshes authority and server certificates, but also CRLs. Example
|
/openbmc/openbmc/meta-google/recipes-phosphor/packagegroups/ |
H A D | packagegroup-obmc-apps.bbappend | 4 RDEPENDS:${PN}-extras:remove:gbmc = "phosphor-nslcd-authority-cert-config"
|
/openbmc/phosphor-certificate-manager/test/ |
H A D | certs_manager_test.cpp | 313 CertificateType type = CertificateType::authority; in TEST_F() 356 CertificateType type = CertificateType::authority; in TEST_F() 397 CertificateType type = CertificateType::authority; in TEST_F() 453 CertificateType type = CertificateType::authority; in TEST_F() 511 CertificateType type = CertificateType::authority; in TEST_F() 674 CertificateType type = CertificateType::authority; in TEST_F() 724 CertificateType type = CertificateType::authority; in TEST_F() 1591 CertificateType type = CertificateType::authority; in TEST_F() 1619 CertificateType type = CertificateType::authority; in TEST_F() 1671 CertificateType type = CertificateType::authority; in TEST_F() [all …]
|
/openbmc/openbmc/poky/meta/recipes-graphics/xorg-app/ |
H A D | xauth_1.1.3.bb | 2 SUMMARY = "X authority utilities"
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/ |
H A D | python3-trustme_1.2.1.bb | 1 DESCRIPTION = "A utility provides a fake certificate authority (CA)"
|
/openbmc/openbmc/meta-security/recipes-ids/suricata/files/ |
H A D | CVE-2024-38535_pre.patch | 261 - assert_eq!(hd.name, ":authority".as_bytes().to_vec()); 263 + assert_eq!(hd.name, ":authority".as_bytes().to_vec().into()); 272 - assert_eq!(hd.name, ":authority".as_bytes().to_vec()); 274 + assert_eq!(hd.name, ":authority".as_bytes().to_vec().into());
|
/openbmc/openbmc-test-automation/docs/ |
H A D | certificate_generate.md | 5 A. Create your own SSL certificate authority 13 **Create your own SSL certificate authority** 15 1. Create private key for certificate authority(CA).
|
/openbmc/linux/fs/smb/server/ |
H A D | smbacl.c | 89 if (ctsid->authority[i] != cwsid->authority[i]) { in compare_sids() 90 if (ctsid->authority[i] > cwsid->authority[i]) in compare_sids() 123 dst->authority[i] = src->authority[i]; in smb_copy_sid() 211 pntace->sid.authority[i] = psid->authority[i]; in fill_ace_for_sid()
|
/openbmc/docs/designs/management-console/ |
H A D | Authorities_List_Management.md | 71 invocation, it deletes all current authority objects, takes the input PEM, and 79 No changes. Individual authority certificate can still be replaced respectively.
|
/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | OGL-UK-1.0 | 55 …as the authority to offer Information under the terms of this licence or the Controller of Her Maj… 64 The Controller of HMSO has authority to license Information subject to copyright and database right…
|
H A D | OGL-UK-3.0 | 54 …der which has the authority to offer Information under the terms of this licence or the Keeper of … 63 The Keeper of the Public Records has authority to license Information subject to copyright and data…
|
H A D | OGL-UK-2.0 | 55 …e authority to offer Information under the terms of this licence. It includes the Controller of He… 66 The Controller of HMSO has authority to license Information subject to copyright and database right…
|