Home
last modified time | relevance | path

Searched full:identity (Results 1 – 25 of 431) sorted by relevance

12345678910>>...18

/openbmc/qemu/authz/
H A Dsimple.c28 const char *identity, in qauthz_simple_is_allowed() argument
33 trace_qauthz_simple_is_allowed(authz, sauthz->identity, identity); in qauthz_simple_is_allowed()
34 return g_str_equal(identity, sauthz->identity); in qauthz_simple_is_allowed()
44 g_free(sauthz->identity); in qauthz_simple_prop_set_identity()
45 sauthz->identity = g_strdup(value); in qauthz_simple_prop_set_identity()
55 return g_strdup(sauthz->identity); in qauthz_simple_prop_get_identity()
64 g_free(sauthz->identity); in qauthz_simple_finalize()
73 if (!sauthz->identity) { in qauthz_simple_complete()
74 error_setg(errp, "The 'identity' property must be set"); in qauthz_simple_complete()
89 object_class_property_add_str(oc, "identity", in qauthz_simple_class_init()
[all …]
H A Dtrace-events4 qauthz_is_allowed(void *authz, const char *identity, bool allowed) "AuthZ %p check identity=%s allo…
7 …ar *wantidentity, const char *gotidentity) "AuthZ simple %p check want identity=%s got identity=%s"
10 …k_rule(void *authz, const char *identity, const char *rule, int format, int policy) "AuthZ list %p…
11 …uthz_list_default_policy(void *authz, const char *identity, int policy) "AuthZ list %p default ide…
18 qauthz_pam_check(void *authz, const char *identity, const char *service) "AuthZ PAM %p identity=%s …
H A Dbase.c27 const char *identity, in qauthz_is_allowed() argument
33 allowed = cls->is_allowed(authz, identity, errp); in qauthz_is_allowed()
34 trace_qauthz_is_allowed(authz, identity, allowed); in qauthz_is_allowed()
41 const char *identity, in qauthz_is_allowed_by_id() argument
65 return qauthz_is_allowed(authz, identity, errp); in qauthz_is_allowed_by_id()
H A Dpamacct.c31 const char *identity, in qauthz_pam_is_allowed() argument
39 trace_qauthz_pam_check(authz, identity, pauthz->service); in qauthz_pam_is_allowed()
41 identity, in qauthz_pam_is_allowed()
54 identity, pam_strerror(pamh, ret)); in qauthz_pam_is_allowed()
H A Dlist.c29 const char *identity, in qauthz_list_is_allowed() argument
40 trace_qauthz_list_check_rule(authz, rule->match, identity, in qauthz_list_is_allowed()
44 if (g_str_equal(rule->match, identity)) { in qauthz_list_is_allowed()
49 if (g_pattern_match_simple(rule->match, identity)) { in qauthz_list_is_allowed()
60 trace_qauthz_list_default_policy(authz, identity, lauthz->policy); in qauthz_list_is_allowed()
/openbmc/qemu/include/authz/
H A Dbase.h51 const char *identity,
59 * @identity: the user identity to authorize
62 * Check if a user @identity is authorized. If an error
71 * Returns: true if @identity is authorized, false if denied or if
75 const char *identity,
82 * @identity: the user identity to authorize
85 * Check if a user @identity is authorized. If an error
94 * Returns: true if @identity is authorized, false if denied or if
98 const char *identity,
H A Dsimple.h48 * "identity": "fred"
55 * -object authz-simple,id=authz0,identity=fred
61 char *identity; member
68 const char *identity,
/openbmc/linux/Documentation/ABI/testing/
Dsysfs-class-typec
Dsysfs-devices-soc
/openbmc/qemu/docs/system/
H A Dauthz.rst8 their identity. If the authorization identity database is scoped to the QEMU
9 client this may be sufficient. It is common, however, for the identity database
14 Identity providers
18 that emit an identity upon completion.
29 the client provide a certificate to the server to prove its own identity.
36 the certificate can be used as an identity in the QEMU authorization
61 based on an exact match against a single identity. This is useful when it is
67 thus be used as the identity to match against. Alternatively if the virtual
80 "identity": "fred"
89 -object authz-simple,id=authz0,identity=fred
[all …]
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Attestation/
H A DIdentityAuthentication.interface.yaml2 Implement to represent properties related to Identity Authentication using
10 The status of the verification of the identity of the component.
17 certificate that provides the requester's identity.
26 certificate that provides the responder's identity.
/openbmc/linux/drivers/media/dvb-frontends/
Ddib0090.c
/openbmc/qemu/qapi/
H A Dauthz.json45 # @match: a string or glob to match against a user identity
111 # @identity: Identifies the allowed user. Its format depends on the
113 # For authorizing based on TLS x509 certificates, the identity
119 'data': { 'identity': 'str' } }
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/poppler/
H A Dpoppler-data_0.4.12.bb18 ${CMAP_RESOURCES_BASE}/Identity-H;name=idh \
19 ${CMAP_RESOURCES_BASE}/Identity-V;name=idv"
33 install -m644 ${UNPACKDIR}/Identity-* ${D}${datadir}/poppler/cMap/
/openbmc/linux/arch/arm/mm/
Didmap.c
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/
H A DComponentIntegrity.v1_3_1.json43 …"longDescription": "This object shall contain common identity-related authentication information.",
61 … "description": "A link to the certificate that represents the identity of the component.",
62 … contain a link to a resource of type `Certificate` that represents the identity of the component …
74 … "description": "The status of the verification of the identity of the component.",
75 …on": "This property shall contain the status of the verification of the identity of the component …
529 … "description": "Identity authentication information about the SPDM Requester and SPDM Responder.",
530 …"longDescription": "This object shall contain identity authentication information about the SPDM R…
555 … "description": "Authentication information of the identity of the SPDM Requester.",
556 …iption": "This property shall contain authentication information of the identity of the SPDM Reque…
567 … "description": "Authentication information of the identity of the SPDM Responder.",
[all …]
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema-installed/
H A DComponentIntegrity.v1_3_1.json43 …"longDescription": "This object shall contain common identity-related authentication information.",
61 … "description": "A link to the certificate that represents the identity of the component.",
62 … contain a link to a resource of type `Certificate` that represents the identity of the component …
74 … "description": "The status of the verification of the identity of the component.",
75 …on": "This property shall contain the status of the verification of the identity of the component …
529 … "description": "Identity authentication information about the SPDM Requester and SPDM Responder.",
530 …"longDescription": "This object shall contain identity authentication information about the SPDM R…
555 … "description": "Authentication information of the identity of the SPDM Requester.",
556 …iption": "This property shall contain authentication information of the identity of the SPDM Reque…
567 … "description": "Authentication information of the identity of the SPDM Responder.",
[all …]
/openbmc/linux/include/linux/platform_data/
Dmlxreg.h
/openbmc/openbmc/poky/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/
H A Dwpa_supplicant.conf281 # identity: Identity string for EAP
282 # anonymous_identity: Anonymous identity string for EAP (to be used as the
283 # unencrypted identity with EAP types that support different tunnelled
284 # identity, e.g., EAP-TTLS)
462 identity="user@example.com"
476 identity="user@example.com"
484 # EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the
485 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel.
490 identity="user@example.com"
497 # EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the unencrypted
[all …]
/openbmc/phosphor-logging/extensions/openpower-pels/
H A Dcallout.hpp30 * * FRU Identity (must be first if present)
49 // Leaving out the various PCE identity ones since
239 * @brief Returns the FRU identity substructure
249 * @brief Returns the PCE identity substructure
259 * @brief Returns the MRU identity substructure
327 * @brief FRU (Field Replaceable Unit) Identity substructure
332 * @brief PCE (Power Controlling Enclosure) Identity substructure
/openbmc/linux/Documentation/driver-api/usb/
Dtypec.rst
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/
H A DCertificate.interface.yaml17 An X.509 certificate contains a public key, validity, and an identity
101 integrity object whose requester's identity is identified by this
111 integrity object whose responder's identity is identified by this
/openbmc/openbmc/poky/meta/recipes-devtools/git/git/
H A Dfixsort.patch10 "sendemail.identity",
11 "sendemail.<identity>.*",
/openbmc/sdbusplus/include/sdbusplus/async/stdexec/__detail/
H A D__receiver_ref.hpp44 template <class _GetReceiver = std::identity, class _Obj, class _Tag,
71 template <class _OpState, class _GetEnv, class _GetReceiver = std::identity>
100 template <class _OpState, class _GetEnv, class _GetReceiver = std::identity>
/openbmc/linux/Documentation/admin-guide/device-mapper/
Dlinear.rst

12345678910>>...18