| /OK3568_Linux_fs/kernel/arch/s390/boot/ |
| H A D | ipl_report.c | 31 struct ipl_rb_certificates *certs, in find_bootdata_space() argument 45 for_each_rb_entry(cert, certs) in find_bootdata_space() 65 for_each_rb_entry(cert, certs) in find_bootdata_space() 85 static void copy_certificates_bootdata(struct ipl_rb_certificates *certs) in copy_certificates_bootdata() argument 91 for_each_rb_entry(cert, certs) { in copy_certificates_bootdata() 101 struct ipl_rb_certificates *certs; in read_ipl_report() local 128 certs = NULL; in read_ipl_report() 137 certs = (struct ipl_rb_certificates *) rb_hdr; in read_ipl_report() 153 if (!comps || !certs) in read_ipl_report() 160 safe_addr = find_bootdata_space(comps, certs, safe_addr); in read_ipl_report() [all …]
|
| /OK3568_Linux_fs/kernel/net/wireless/ |
| H A D | Makefile | 22 cfg80211-$(CONFIG_CFG80211_USE_KERNEL_REGDB_KEYS) += shipped-certs.o 24 cfg80211-y += extra-certs.o 27 $(obj)/shipped-certs.c: $(wildcard $(srctree)/$(src)/certs/*.hex) 36 $(obj)/extra-certs.c: $(CONFIG_CFG80211_EXTRA_REGDB_KEYDIR:"%"=%) \ 60 clean-files += shipped-certs.c extra-certs.c
|
| H A D | .gitignore | 2 shipped-certs.c 3 extra-certs.c
|
| /OK3568_Linux_fs/buildroot/package/ca-certificates/ |
| H A D | ca-certificates.mk | 20 $(INSTALL) -d -m 0755 $(TARGET_DIR)/etc/ssl/certs 25 rm -f $(TARGET_DIR)/etc/ssl/certs/* 31 ln -sf ../../../$$i etc/ssl/certs/`basename $${i} .crt`.pem ;\ 36 $(HOST_DIR)/bin/c_rehash $(TARGET_DIR)/etc/ssl/certs 40 $(TARGET_DIR)/etc/ssl/certs/ca-certificates.crt
|
| /OK3568_Linux_fs/kernel/crypto/asymmetric_keys/ |
| H A D | pkcs7_parser.c | 27 struct x509_certificate *certs; /* Certificate cache */ member 63 while (pkcs7->certs) { in pkcs7_free_message() 64 cert = pkcs7->certs; in pkcs7_free_message() 65 pkcs7->certs = cert->next; in pkcs7_free_message() 136 ctx->ppcerts = &ctx->certs; in pkcs7_parse_message() 156 while (ctx->certs) { in pkcs7_parse_message() 157 struct x509_certificate *cert = ctx->certs; in pkcs7_parse_message() 158 ctx->certs = cert->next; in pkcs7_parse_message() 424 *ctx->ppcerts = ctx->msg->certs; in pkcs7_note_certificate_list() 425 ctx->msg->certs = ctx->certs; in pkcs7_note_certificate_list() [all …]
|
| H A D | verify_pefile.c | 94 (unsigned long)&ddir->certs - (unsigned long)pebuf; in pefile_parse_binary() 95 ctx->certs_size = ddir->certs.size; in pefile_parse_binary() 97 if (!ddir->certs.virtual_address || !ddir->certs.size) { in pefile_parse_binary() 102 chkaddr(ctx->header_size, ddir->certs.virtual_address, in pefile_parse_binary() 103 ddir->certs.size); in pefile_parse_binary() 104 ctx->sig_offset = ddir->certs.virtual_address; in pefile_parse_binary() 105 ctx->sig_len = ddir->certs.size; in pefile_parse_binary()
|
| H A D | pkcs7_verify.c | 167 for (x509 = pkcs7->certs; x509; x509 = x509->next, certix++) { in pkcs7_find_key() 210 for (p = pkcs7->certs; p; p = p->next) in pkcs7_verify_sig_chain() 261 for (p = pkcs7->certs; p; p = p->next) { in pkcs7_verify_sig_chain() 270 for (p = pkcs7->certs; p; p = p->next) { in pkcs7_verify_sig_chain()
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-connectivity/freeradius/files/ |
| H A D | check-openssl-cmds-in-script-bootstrap.patch | 17 raddb/certs/bootstrap | 8 ++++++++ 20 diff --git a/raddb/certs/bootstrap b/raddb/certs/bootstrap 22 --- a/raddb/certs/bootstrap 23 +++ b/raddb/certs/bootstrap
|
| H A D | 0001-raddb-certs-Makefile-fix-the-existed-certificate-err.patch | 4 Subject: [PATCH] raddb/certs/Makefile: fix the existed certificate error 28 raddb/certs/Makefile | 4 ++-- 31 diff --git a/raddb/certs/Makefile b/raddb/certs/Makefile 33 --- a/raddb/certs/Makefile 34 +++ b/raddb/certs/Makefile
|
| H A D | 0001-raddb-certs-Makefile-fix-the-occasional-verification.patch | 4 Subject: [PATCH] raddb/certs/Makefile: fix the occasional verification failure 7 # cd /etc/raddb/certs 28 raddb/certs/Makefile | 30 +++++++++++++++--------------- 31 diff --git a/raddb/certs/Makefile b/raddb/certs/Makefile 33 --- a/raddb/certs/Makefile 34 +++ b/raddb/certs/Makefile
|
| H A D | freeradius | 36 if [ ! -f /etc/raddb/certs/server.pem ]; then 38 if sudo -u radiusd /etc/raddb/certs/bootstrap 1> /dev/null 2> /dev/null; then
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/crypt/ |
| H A D | sub.mk | 15 CRYPT_CA_CRT = ../../certs/ca.crt 16 CRYPT_MID_CRT = ../../certs/mid.crt 17 CRYPT_MID_KEY = ../../certs/mid.key
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/meta/ |
| H A D | buildtools-tarball.bb | 72 if [ -e "${SDK_OUTPUT}${SDKPATHNATIVE}${sysconfdir}/ssl/certs/ca-certificates.crt" ]; then 73 …echo 'export GIT_SSL_CAINFO="${SDKPATHNATIVE}${sysconfdir}/ssl/certs/ca-certificates.crt"' >>$scri… 74 …echo 'export SSL_CERT_FILE="${SDKPATHNATIVE}${sysconfdir}/ssl/certs/ca-certificates.crt"' >>$script 75 …echo 'export REQUESTS_CA_BUNDLE="${SDKPATHNATIVE}${sysconfdir}/ssl/certs/ca-certificates.crt"' >>$… 76 …echo 'export CURL_CA_BUNDLE="${SDKPATHNATIVE}${sysconfdir}/ssl/certs/ca-certificates.crt"' >>$scri…
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/python/python3-pip/ |
| H A D | 0001-change-shebang-to-python3.patch | 23 src/pip/_vendor/requests/certs.py | 2 +- 106 diff --git a/src/pip/_vendor/requests/certs.py b/src/pip/_vendor/requests/certs.py 108 --- a/src/pip/_vendor/requests/certs.py 109 +++ b/src/pip/_vendor/requests/certs.py
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/host/openssl/include/openssl/ |
| H A D | cms.h | 147 STACK_OF(X509) *certs, BIO *data, 152 STACK_OF(X509) *certs, unsigned int flags); 173 int CMS_verify(CMS_ContentInfo *cms, STACK_OF(X509) *certs, 177 STACK_OF(X509) *certs, 182 CMS_ContentInfo *CMS_encrypt(STACK_OF(X509) *certs, BIO *in, 275 int CMS_set1_signers_certs(CMS_ContentInfo *cms, STACK_OF(X509) *certs,
|
| H A D | ocsp.h | 144 STACK_OF(X509) *certs; 301 STACK_OF(X509) *certs; 438 STACK_OF(X509) *certs, unsigned long flags); 458 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, 484 STACK_OF(X509) *certs, unsigned long flags); 569 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
|
| H A D | pkcs7.h | 338 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 346 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, 348 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, 350 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher,
|
| H A D | ts.h | 501 STACK_OF(X509) *certs; /* Certs to include in signed data. */ 541 int TS_RESP_CTX_set_certs(TS_RESP_CTX *ctx, STACK_OF(X509) *certs); 615 int TS_RESP_verify_signature(PKCS7 *token, STACK_OF(X509) *certs, 665 STACK_OF(X509) *certs; 745 int TS_CONF_set_certs(CONF *conf, const char *section, const char *certs,
|
| /OK3568_Linux_fs/buildroot/package/prosody/ |
| H A D | prosody.mk | 57 rm -f $(TARGET_DIR)/etc/prosody/certs/Makefile 58 rm -f $(TARGET_DIR)/etc/prosody/certs/*.cnf
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/ca-certificates/ca-certificates/ |
| H A D | 0002-update-ca-certificates-use-SYSROOT.patch | 28 -ETCCERTSDIR=/etc/ssl/certs 30 +ETCCERTSDIR=$SYSROOT/etc/ssl/certs
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/openssl/ |
| H A D | pkcs7.h | 57 CBB *out, const STACK_OF(X509) *certs); 213 STACK_OF(X509) *certs, BIO *data, int flags);
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/openssl/ |
| H A D | pkcs7.h | 57 CBB *out, const STACK_OF(X509) *certs); 213 STACK_OF(X509) *certs, BIO *data, int flags);
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/openssl/ |
| H A D | pkcs7.h | 57 CBB *out, const STACK_OF(X509) *certs); 213 STACK_OF(X509) *certs, BIO *data, int flags);
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/openssl/ |
| H A D | pkcs7.h | 57 CBB *out, const STACK_OF(X509) *certs); 213 STACK_OF(X509) *certs, BIO *data, int flags);
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-perl/recipes-perl/libio/ |
| H A D | libio-socket-ssl-perl_2.074.bb | 37 cp -pRP ${S}/certs ${D}${docdir}/${PN}/ 43 cp -r ${B}/certs ${D}${PTEST_PATH}
|