Home
last modified time | relevance | path

Searched refs:certs (Results 1 – 25 of 91) sorted by relevance

1234

/OK3568_Linux_fs/kernel/arch/s390/boot/
H A Dipl_report.c31 struct ipl_rb_certificates *certs, in find_bootdata_space() argument
45 for_each_rb_entry(cert, certs) in find_bootdata_space()
65 for_each_rb_entry(cert, certs) in find_bootdata_space()
85 static void copy_certificates_bootdata(struct ipl_rb_certificates *certs) in copy_certificates_bootdata() argument
91 for_each_rb_entry(cert, certs) { in copy_certificates_bootdata()
101 struct ipl_rb_certificates *certs; in read_ipl_report() local
128 certs = NULL; in read_ipl_report()
137 certs = (struct ipl_rb_certificates *) rb_hdr; in read_ipl_report()
153 if (!comps || !certs) in read_ipl_report()
160 safe_addr = find_bootdata_space(comps, certs, safe_addr); in read_ipl_report()
[all …]
/OK3568_Linux_fs/kernel/net/wireless/
H A DMakefile22 cfg80211-$(CONFIG_CFG80211_USE_KERNEL_REGDB_KEYS) += shipped-certs.o
24 cfg80211-y += extra-certs.o
27 $(obj)/shipped-certs.c: $(wildcard $(srctree)/$(src)/certs/*.hex)
36 $(obj)/extra-certs.c: $(CONFIG_CFG80211_EXTRA_REGDB_KEYDIR:"%"=%) \
60 clean-files += shipped-certs.c extra-certs.c
H A D.gitignore2 shipped-certs.c
3 extra-certs.c
/OK3568_Linux_fs/buildroot/package/ca-certificates/
H A Dca-certificates.mk20 $(INSTALL) -d -m 0755 $(TARGET_DIR)/etc/ssl/certs
25 rm -f $(TARGET_DIR)/etc/ssl/certs/*
31 ln -sf ../../../$$i etc/ssl/certs/`basename $${i} .crt`.pem ;\
36 $(HOST_DIR)/bin/c_rehash $(TARGET_DIR)/etc/ssl/certs
40 $(TARGET_DIR)/etc/ssl/certs/ca-certificates.crt
/OK3568_Linux_fs/kernel/crypto/asymmetric_keys/
H A Dpkcs7_parser.c27 struct x509_certificate *certs; /* Certificate cache */ member
63 while (pkcs7->certs) { in pkcs7_free_message()
64 cert = pkcs7->certs; in pkcs7_free_message()
65 pkcs7->certs = cert->next; in pkcs7_free_message()
136 ctx->ppcerts = &ctx->certs; in pkcs7_parse_message()
156 while (ctx->certs) { in pkcs7_parse_message()
157 struct x509_certificate *cert = ctx->certs; in pkcs7_parse_message()
158 ctx->certs = cert->next; in pkcs7_parse_message()
424 *ctx->ppcerts = ctx->msg->certs; in pkcs7_note_certificate_list()
425 ctx->msg->certs = ctx->certs; in pkcs7_note_certificate_list()
[all …]
H A Dverify_pefile.c94 (unsigned long)&ddir->certs - (unsigned long)pebuf; in pefile_parse_binary()
95 ctx->certs_size = ddir->certs.size; in pefile_parse_binary()
97 if (!ddir->certs.virtual_address || !ddir->certs.size) { in pefile_parse_binary()
102 chkaddr(ctx->header_size, ddir->certs.virtual_address, in pefile_parse_binary()
103 ddir->certs.size); in pefile_parse_binary()
104 ctx->sig_offset = ddir->certs.virtual_address; in pefile_parse_binary()
105 ctx->sig_len = ddir->certs.size; in pefile_parse_binary()
H A Dpkcs7_verify.c167 for (x509 = pkcs7->certs; x509; x509 = x509->next, certix++) { in pkcs7_find_key()
210 for (p = pkcs7->certs; p; p = p->next) in pkcs7_verify_sig_chain()
261 for (p = pkcs7->certs; p; p = p->next) { in pkcs7_verify_sig_chain()
270 for (p = pkcs7->certs; p; p = p->next) { in pkcs7_verify_sig_chain()
/OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-connectivity/freeradius/files/
H A Dcheck-openssl-cmds-in-script-bootstrap.patch17 raddb/certs/bootstrap | 8 ++++++++
20 diff --git a/raddb/certs/bootstrap b/raddb/certs/bootstrap
22 --- a/raddb/certs/bootstrap
23 +++ b/raddb/certs/bootstrap
H A D0001-raddb-certs-Makefile-fix-the-existed-certificate-err.patch4 Subject: [PATCH] raddb/certs/Makefile: fix the existed certificate error
28 raddb/certs/Makefile | 4 ++--
31 diff --git a/raddb/certs/Makefile b/raddb/certs/Makefile
33 --- a/raddb/certs/Makefile
34 +++ b/raddb/certs/Makefile
H A D0001-raddb-certs-Makefile-fix-the-occasional-verification.patch4 Subject: [PATCH] raddb/certs/Makefile: fix the occasional verification failure
7 # cd /etc/raddb/certs
28 raddb/certs/Makefile | 30 +++++++++++++++---------------
31 diff --git a/raddb/certs/Makefile b/raddb/certs/Makefile
33 --- a/raddb/certs/Makefile
34 +++ b/raddb/certs/Makefile
H A Dfreeradius36 if [ ! -f /etc/raddb/certs/server.pem ]; then
38 if sudo -u radiusd /etc/raddb/certs/bootstrap 1> /dev/null 2> /dev/null; then
/OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/crypt/
H A Dsub.mk15 CRYPT_CA_CRT = ../../certs/ca.crt
16 CRYPT_MID_CRT = ../../certs/mid.crt
17 CRYPT_MID_KEY = ../../certs/mid.key
/OK3568_Linux_fs/yocto/poky/meta/recipes-core/meta/
H A Dbuildtools-tarball.bb72 if [ -e "${SDK_OUTPUT}${SDKPATHNATIVE}${sysconfdir}/ssl/certs/ca-certificates.crt" ]; then
73 …echo 'export GIT_SSL_CAINFO="${SDKPATHNATIVE}${sysconfdir}/ssl/certs/ca-certificates.crt"' >>$scri…
74 …echo 'export SSL_CERT_FILE="${SDKPATHNATIVE}${sysconfdir}/ssl/certs/ca-certificates.crt"' >>$script
75 …echo 'export REQUESTS_CA_BUNDLE="${SDKPATHNATIVE}${sysconfdir}/ssl/certs/ca-certificates.crt"' >>$…
76 …echo 'export CURL_CA_BUNDLE="${SDKPATHNATIVE}${sysconfdir}/ssl/certs/ca-certificates.crt"' >>$scri…
/OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/python/python3-pip/
H A D0001-change-shebang-to-python3.patch23 src/pip/_vendor/requests/certs.py | 2 +-
106 diff --git a/src/pip/_vendor/requests/certs.py b/src/pip/_vendor/requests/certs.py
108 --- a/src/pip/_vendor/requests/certs.py
109 +++ b/src/pip/_vendor/requests/certs.py
/OK3568_Linux_fs/external/security/rk_tee_user/v2/host/openssl/include/openssl/
H A Dcms.h147 STACK_OF(X509) *certs, BIO *data,
152 STACK_OF(X509) *certs, unsigned int flags);
173 int CMS_verify(CMS_ContentInfo *cms, STACK_OF(X509) *certs,
177 STACK_OF(X509) *certs,
182 CMS_ContentInfo *CMS_encrypt(STACK_OF(X509) *certs, BIO *in,
275 int CMS_set1_signers_certs(CMS_ContentInfo *cms, STACK_OF(X509) *certs,
H A Docsp.h144 STACK_OF(X509) *certs;
301 STACK_OF(X509) *certs;
438 STACK_OF(X509) *certs, unsigned long flags);
458 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs,
484 STACK_OF(X509) *certs, unsigned long flags);
569 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
H A Dpkcs7.h338 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs,
346 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store,
348 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs,
350 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher,
H A Dts.h501 STACK_OF(X509) *certs; /* Certs to include in signed data. */
541 int TS_RESP_CTX_set_certs(TS_RESP_CTX *ctx, STACK_OF(X509) *certs);
615 int TS_RESP_verify_signature(PKCS7 *token, STACK_OF(X509) *certs,
665 STACK_OF(X509) *certs;
745 int TS_CONF_set_certs(CONF *conf, const char *section, const char *certs,
/OK3568_Linux_fs/buildroot/package/prosody/
H A Dprosody.mk57 rm -f $(TARGET_DIR)/etc/prosody/certs/Makefile
58 rm -f $(TARGET_DIR)/etc/prosody/certs/*.cnf
/OK3568_Linux_fs/yocto/poky/meta/recipes-support/ca-certificates/ca-certificates/
H A D0002-update-ca-certificates-use-SYSROOT.patch28 -ETCCERTSDIR=/etc/ssl/certs
30 +ETCCERTSDIR=$SYSROOT/etc/ssl/certs
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/openssl/
H A Dpkcs7.h57 CBB *out, const STACK_OF(X509) *certs);
213 STACK_OF(X509) *certs, BIO *data, int flags);
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/openssl/
H A Dpkcs7.h57 CBB *out, const STACK_OF(X509) *certs);
213 STACK_OF(X509) *certs, BIO *data, int flags);
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/openssl/
H A Dpkcs7.h57 CBB *out, const STACK_OF(X509) *certs);
213 STACK_OF(X509) *certs, BIO *data, int flags);
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/openssl/
H A Dpkcs7.h57 CBB *out, const STACK_OF(X509) *certs);
213 STACK_OF(X509) *certs, BIO *data, int flags);
/OK3568_Linux_fs/yocto/meta-openembedded/meta-perl/recipes-perl/libio/
H A Dlibio-socket-ssl-perl_2.074.bb37 cp -pRP ${S}/certs ${D}${docdir}/${PN}/
43 cp -r ${B}/certs ${D}${PTEST_PATH}

1234