| /OK3568_Linux_fs/yocto/poky/meta/classes/ |
| H A D | sign_package_feed.bbclass | 1 # Class for signing package feeds 6 # Path to a file containing the passphrase of the signing key. 10 # Optional variable for specifying the backend to use for signing. 11 # Currently the only available option is 'local', i.e. local signing 21 # signing. 32 # Make feed signing key to be present in rootfs 33 FEATURE_PACKAGES_package-management:append = " signing-keys-packagefeed" 46 do_package_index[depends] += "signing-keys:do_deploy" 47 do_rootfs[depends] += "signing-keys:do_populate_sysroot gnupg-native:do_populate_sysroot"
|
| H A D | sign_rpm.bbclass | 5 # The passphrase of the signing key. 9 # Optional variable for specifying the backend to use for signing. 10 # Currently the only available option is 'local', i.e. local signing 16 # Optional variable for the file signing key. 18 # Optional variable for the file signing key password. 21 # signing. 69 do_package_index[depends] += "signing-keys:do_deploy" 70 do_rootfs[depends] += "signing-keys:do_populate_sysroot"
|
| H A D | sign_ipk.bbclass | 5 # Path to a file containing the passphrase of the signing key. 9 # Optional variable for specifying the backend to use for signing. 10 # Currently the only available option is 'local', i.e. local signing 18 # signing.
|
| H A D | uboot-sign.bbclass | 24 # signing, and kernel will deploy UBOOT_DTB_BINARY after signs it. 79 # Generate keys for signing Kernel / U-Boot fitImage 215 # signing, and kernel will deploy UBOOT_DTB_BINARY after signs it. 289 echo "Generating RSA private key for signing U-Boot fitImage" 294 echo "Generating certificate for signing U-Boot fitImage" 412 # If we're not signing the Kernel fitImage, that means
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/ |
| H A D | module-signing.rst | 1 Kernel module signing facility 7 .. - Configuring module signing. 8 .. - Generating signing keys. 10 .. - Manually signing modules. 21 The kernel module signing facility cryptographically signs modules during 24 or modules signed with an invalid key. Module signing increases security by 38 Configuring module signing 41 The module signing facility is enabled by going to the 96 (4) :menuselection:`File name or PKCS#11 URI of module signing key` 100 ``certs/signing_key.pem`` will disable the autogeneration of signing keys [all …]
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/meta/ |
| H A D | signing-keys.bb | 4 SUMMARY = "Makes public keys of the signing keys available" 25 # Export public key of the rpm signing key 31 # Export public key of the ipk signing key 37 # Export public key of the feed signing key
|
| /OK3568_Linux_fs/kernel/Documentation/kbuild/ |
| H A D | reproducible-builds.rst | 74 Module signing 79 modules being unreproducible. However, including a signing key with 80 your source would presumably defeat the purpose of signing modules. 85 1. Generate a persistent signing key. Add the certificate for the key 89 signing key's certificate, set ``CONFIG_MODULE_SIG_KEY`` to an
|
| /OK3568_Linux_fs/u-boot/doc/uImage.FIT/ |
| H A D | signature.txt | 22 The procedure for signing is as follows: 37 The signing is generally performed by mkimage, as part of making a firmware 90 - key-name-hint: Name of key to use for signing. The keys will normally be in 129 sign-configs.its for config signing. 146 - key-name-hint: Name of key used for signing. This is only a hint since it 148 all available signing keys until one matches. 157 Each signing algorithm has its own additional properties. 170 While signing images is useful, it does not provide complete protection 330 CONFIG_FIT_SIGNATURE - enable signing and verification in FITs 331 CONFIG_RSA - enable RSA algorithm for signing [all …]
|
| /OK3568_Linux_fs/kernel/fs/cifs/ |
| H A D | smb2transport.c | 390 struct derivation signing; member 415 rc = generate_key(ses, ptriplet->signing.label, in generate_smb3signingkey() 416 ptriplet->signing.context, in generate_smb3signingkey() 422 rc = generate_key(ses, ptriplet->signing.label, in generate_smb3signingkey() 423 ptriplet->signing.context, in generate_smb3signingkey() 483 d = &triplet.signing; in generate_smb30signingkey() 511 d = &triplet.signing; in generate_smb311signingkey()
|
| /OK3568_Linux_fs/kernel/certs/ |
| H A D | Kconfig | 5 string "File name or PKCS#11 URI of module signing key" 16 certificate as described in Documentation/admin-guide/module-signing.rst 37 system keyring. Any certificate used for module signing is implicitly
|
| /OK3568_Linux_fs/buildroot/package/python-oauthlib/ |
| H A D | Config.in | 6 OAuth request-signing logic.
|
| /OK3568_Linux_fs/kernel/Documentation/crypto/ |
| H A D | asymmetric-keys.rst | 343 The kernel builtin trusted keyring will be searched for the signing key. 354 signing key. If the secondary trusted keyring is not configured, this 367 a group of keys may be searched for the signing key by providing the 371 within the destination keyring will also be searched for signing keys. 394 keyring, we can be certain that it has a valid signing chain going back to 415 keyring, we can be certain that there is a valid signing chain going back 419 In all of these cases, if the signing key is found the signature of the key to 420 be linked will be verified using the signing key. The requested key is added
|
| /OK3568_Linux_fs/yocto/poky/meta-selftest/classes/ |
| H A D | test-mkimage-wrapper.bbclass | 16 echo "### uboot-mkimage signing wrapper message"
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-python/recipes-devtools/python/ |
| H A D | python3-imgtool_1.9.0.bb | 1 SUMMARY = "MCUboot's image signing and key management tool"
|
| H A D | python3-oauthlib_3.2.2.bb | 1 SUMMARY = "A generic, spec-compliant, thorough implementation of the OAuth request-signing logic"
|
| /OK3568_Linux_fs/buildroot/package/python-rsa/ |
| H A D | Config.in | 7 encryption and decryption, signing and verifying signatures,
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/gpgme/ |
| H A D | gpgme_1.17.1.bb | 1 SUMMARY = "High-level GnuPG encryption/signing API" 2 …cations. It provides a High-Level Crypto API for encryption, decryption, signing, signature verifi…
|
| /OK3568_Linux_fs/buildroot/package/flickcurl/ |
| H A D | Config.in | 11 creating the requests, signing, token management, calling
|
| /OK3568_Linux_fs/kernel/crypto/asymmetric_keys/ |
| H A D | mscode.asn1 | 1 --- Microsoft individual code signing data blob parser
|
| /OK3568_Linux_fs/buildroot/package/tpm2-tools/ |
| H A D | Config.in | 15 perform encryption/decryption/signing/etc crypto operations,
|
| /OK3568_Linux_fs/tools/linux/rk_sign_tool/ |
| H A D | readme.txt | 1 …rk_sign_tool is a signing tool for secureboot.it can support 3588|3566|3568|3308|3326|3399|3229|32…
|
| /OK3568_Linux_fs/kernel/Documentation/translations/zh_CN/admin-guide/ |
| H A D | index.rst | 98 module-signing
|
| /OK3568_Linux_fs/kernel/net/wimax/ |
| H A D | Kconfig | 15 Please note that most of these devices require signing up
|
| /OK3568_Linux_fs/buildroot/package/dehydrated/ |
| H A D | Config.in | 12 Dehydrated is a client for signing certificates with an
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/cifs/ |
| H A D | usage.rst | 82 and encrypted shares and stronger signing and authentication algorithms. 224 cifs signing enabled (and the physical network is insecure), consider use 642 Must use packet signing (helps avoid unwanted data modification 643 by intermediate systems in the route). Note that signing 673 Use Kerberos authentication and packet signing 677 Use NTLM password hashing with signing (if 679 server requires signing also can be the default) 683 Use NTLMv2 password hashing with packet signing 723 also packet signing. Authentication (may/must) 725 the signing flags. Specifying two different password [all …]
|