/openbmc/bmcweb/redfish-core/lib/ |
H A D | certificate_service.hpp | 62 namespace certs namespace 261 certs::certPropIntf}; in getCertificateList() 288 if (objPath.parent_path() == certs::httpsObjectPath) in getCertificateList() 294 else if (objPath.parent_path() == certs::ldapObjectPath) in getCertificateList() 300 else if (objPath.parent_path() == certs::authorityObjectPath) in getCertificateList() 340 service, objectPath, certs::certPropIntf, in getCertificateProperties() 437 service, objectPath, certs::objDeleteIntf, "Delete"); in deleteCertificate() 502 getCertificateList(asyncResp, certs::baseObjectPath, in handleCertificateLocationsGet() 581 objectPath = sdbusplus::message::object_path(certs::httpsObjectPath) / in handleReplaceCertificateAction() 584 service = certs::httpsServiceName; in handleReplaceCertificateAction() [all …]
|
/openbmc/linux/arch/s390/boot/ |
H A D | ipl_report.c | 20 static struct ipl_rb_certificates *certs; variable 42 for_each_rb_entry(cert, certs) in get_cert_comp_list_size() 55 for_each_rb_entry(cert, certs) { in ipl_report_certs_intersects() 79 for_each_rb_entry(cert, certs) { in copy_certificates_bootdata() 114 certs = NULL; in read_ipl_report() 123 certs = (struct ipl_rb_certificates *) rb_hdr; in read_ipl_report() 139 if (!comps || !certs) { in read_ipl_report() 140 certs = NULL; in read_ipl_report()
|
/openbmc/linux/net/wireless/ |
H A D | Makefile | 22 cfg80211-$(CONFIG_CFG80211_USE_KERNEL_REGDB_KEYS) += shipped-certs.o 24 cfg80211-y += extra-certs.o 27 $(obj)/shipped-certs.c: $(wildcard $(srctree)/$(src)/certs/*.hex) 36 $(obj)/extra-certs.c: $(CONFIG_CFG80211_EXTRA_REGDB_KEYDIR) \ 60 clean-files += shipped-certs.c extra-certs.c
|
H A D | .gitignore | 2 shipped-certs.c 3 extra-certs.c
|
/openbmc/openbmc/meta-google/recipes-google/default-ca-dev/ |
H A D | default-ca-dev.bb | 6 SRC_URI += "file://certs/authority/" 8 FILES:${PN} = "${sysconfdir}/ssl/certs/authority/*" 11 install -d ${D}${sysconfdir}/ssl/certs/authority 12 install -m 0644 -D ${UNPACKDIR}/certs/authority/* \ 13 ${D}${sysconfdir}/ssl/certs/authority
|
/openbmc/phosphor-certificate-manager/ |
H A D | argument.cpp | 7 namespace phosphor::certs namespace 23 phosphor::certs::CertificateType type = in processArguments() 24 phosphor::certs::stringToCertificateType(arguments.typeStr); in processArguments() 25 if (type == phosphor::certs::CertificateType::unsupported) in processArguments()
|
H A D | mainapp.cpp | 45 phosphor::certs::Arguments arguments; in main() 46 if (phosphor::certs::processArguments(argc, argv, arguments) != 0) in main() 62 phosphor::certs::Manager manager( in main() 64 phosphor::certs::stringToCertificateType(arguments.typeStr), in main()
|
H A D | README.md | 34 --path=/etc/ssl/certs/https/server.pem --unit=bmcweb.service 43 --path=/etc/ssl/certs/authority --unit=bmcweb.service 52 --path=/etc/nslcd/certs/cert.pem 63 constructed by "/xyz/openbmc_project/certs/{type}/{endpoint}". 69 --path=/etc/ssl/certs/https/server.pem --unit=bmcweb.service 73 object path is "/xyz/openbmc_project/certs/server/https".
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/freeradius/files/ |
H A D | 0015-bootstrap-check-commands-of-openssl-exist.patch | 20 raddb/certs/bootstrap | 8 ++++++++ 23 diff --git a/raddb/certs/bootstrap b/raddb/certs/bootstrap 25 --- a/raddb/certs/bootstrap 26 +++ b/raddb/certs/bootstrap
|
H A D | 0012-raddb-certs-Makefile-fix-the-existed-certificate-err.patch | 4 Subject: [PATCH] raddb/certs/Makefile: fix the existed certificate error 28 raddb/certs/Makefile | 4 ++-- 31 diff --git a/raddb/certs/Makefile b/raddb/certs/Makefile 33 --- a/raddb/certs/Makefile 34 +++ b/raddb/certs/Makefile
|
H A D | 0013-raddb-certs-Makefile-fix-the-occasional-verification.patch | 4 Subject: [PATCH] raddb/certs/Makefile: fix the occasional verification failure 7 # cd /etc/raddb/certs 28 raddb/certs/Makefile | 30 +++++++++++++++--------------- 31 diff --git a/raddb/certs/Makefile b/raddb/certs/Makefile 33 --- a/raddb/certs/Makefile 34 +++ b/raddb/certs/Makefile
|
H A D | freeradius | 36 if [ ! -f /etc/raddb/certs/server.pem ]; then 38 if sudo -u radiusd /etc/raddb/certs/bootstrap 1> /dev/null 2> /dev/null; then
|
/openbmc/phosphor-certificate-manager/test/ |
H A D | certs_manager_test.cpp | 36 namespace phosphor::certs namespace 216 MainApp(phosphor::certs::Manager* manager, in MainApp() 217 phosphor::certs::CSR* csr = nullptr) : manager(manager), csr_(csr) in MainApp() 244 phosphor::certs::Manager* manager; 245 phosphor::certs::CSR* csr_; 248 class ManagerInTest : public phosphor::certs::Manager 330 std::vector<std::unique_ptr<Certificate>>& certs = in TEST_F() local 333 ASSERT_EQ(certs.size(), 1); in TEST_F() 335 EXPECT_EQ(certs.front()->validNotAfter() - certs.front()->validNotBefore(), in TEST_F() 337 EXPECT_EQ(certs.front()->subject(), "O=openbmc-project.xyz,CN=localhost"); in TEST_F() [all …]
|
H A D | meson.build | 35 'test-certs-manager', 40 timeout: 500, # Takes about 1 minute to generate all the certs. 48 'test-ca-certs-manager',
|
/openbmc/linux/crypto/asymmetric_keys/ |
H A D | pkcs7_parser.c | 27 struct x509_certificate *certs; /* Certificate cache */ member 63 while (pkcs7->certs) { in pkcs7_free_message() 64 cert = pkcs7->certs; in pkcs7_free_message() 65 pkcs7->certs = cert->next; in pkcs7_free_message() 136 ctx->ppcerts = &ctx->certs; in pkcs7_parse_message() 156 while (ctx->certs) { in pkcs7_parse_message() 157 struct x509_certificate *cert = ctx->certs; in pkcs7_parse_message() 158 ctx->certs = cert->next; in pkcs7_parse_message() 450 *ctx->ppcerts = ctx->msg->certs; in pkcs7_note_certificate_list() 451 ctx->msg->certs = ctx->certs; in pkcs7_note_certificate_list() [all …]
|
H A D | verify_pefile.c | 94 (unsigned long)&ddir->certs - (unsigned long)pebuf; in pefile_parse_binary() 95 ctx->certs_size = ddir->certs.size; in pefile_parse_binary() 97 if (!ddir->certs.virtual_address || !ddir->certs.size) { in pefile_parse_binary() 102 chkaddr(ctx->header_size, ddir->certs.virtual_address, in pefile_parse_binary() 103 ddir->certs.size); in pefile_parse_binary() 104 ctx->sig_offset = ddir->certs.virtual_address; in pefile_parse_binary() 105 ctx->sig_len = ddir->certs.size; in pefile_parse_binary()
|
H A D | pkcs7_verify.c | 166 for (x509 = pkcs7->certs; x509; x509 = x509->next, certix++) { in pkcs7_find_key() 203 for (p = pkcs7->certs; p; p = p->next) in pkcs7_verify_sig_chain() 251 for (p = pkcs7->certs; p; p = p->next) { in pkcs7_verify_sig_chain() 260 for (p = pkcs7->certs; p; p = p->next) { in pkcs7_verify_sig_chain()
|
/openbmc/phosphor-certificate-manager/dist/ |
H A D | meson.build | 5 certs = [] variable 17 certs += 'env/bmcweb' 28 certs += 'env/authority' 41 install_data(certs, install_dir: cert_manager_dir)
|
/openbmc/phosphor-user-manager/ |
H A D | nslcd | 2 #example: /xyz/openbmc_project/certs/client/ldap 6 CERTPATH=/etc/nslcd/certs/cert.pem
|
/openbmc/openbmc/poky/meta/recipes-core/meta/ |
H A D | buildtools-tarball.bb | 76 if [ -e "${SDK_OUTPUT}${SDKPATHNATIVE}${sysconfdir}/ssl/certs/ca-certificates.crt" ]; then 77 …echo 'export GIT_SSL_CAINFO="${SDKPATHNATIVE}${sysconfdir}/ssl/certs/ca-certificates.crt"' >>$scri… 78 …echo 'export SSL_CERT_FILE="${SDKPATHNATIVE}${sysconfdir}/ssl/certs/ca-certificates.crt"' >>$script 79 …echo 'export REQUESTS_CA_BUNDLE="${SDKPATHNATIVE}${sysconfdir}/ssl/certs/ca-certificates.crt"' >>$… 80 …echo 'export CURL_CA_BUNDLE="${SDKPATHNATIVE}${sysconfdir}/ssl/certs/ca-certificates.crt"' >>$scri…
|
/openbmc/phosphor-certificate-manager/dist/env/ |
H A D | authority | 2 #example: /xyz/openbmc_project/certs/authority/truststore 6 CERTPATH=/etc/ssl/certs/authority
|
H A D | bmcweb | 2 #example: /xyz/openbmc_project/certs/server/https 6 CERTPATH=/etc/ssl/certs/https/server.pem
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/ |
H A D | README.md | 19 - The URI /xyz/openbmc_project/certs/server/https maps to instance of the 21 - The URI /xyz/openbmc_project/certs/client/ldap maps to instance of the 23 - The URI /xyz/openbmc_project/certs/authority/truststore maps to instance of 44 url: /xyz/openbmc_project/certs/server/https 48 url: /xyz/openbmc_project/certs/server/https/<cert_id> 52 url: /xyz/openbmc_project/certs/client/ldap 56 url: /xyz/openbmc_project/certs/client/ldap/<cert_id> 203 /xyz/openbmc_project/certs/server/https. 218 e.g: /xyz/openbmc_project/certs/server/https/1 is mapped to 231 /xyz/openbmc_project/certs/server/https/1.
|
/openbmc/openbmc/meta-security/recipes-ids/samhain/files/ |
H A D | samhain-samhainrc.patch | 38 -file = /etc/cups/certs 39 -file = /etc/cups/certs/0 90 -file = /var/lib/cups/certs 91 -file = /var/lib/cups/certs/0
|
/openbmc/phosphor-user-manager/docs/ |
H A D | README.md | 33 -X PUT -T <FILE> https://<BMC_IP>/xyz/openbmc_project/certs/client/ldap 40 -X PUT -T <FILE> https://<BMC_IP>/xyz/openbmc_project/certs/authority/truststore
|