/openbmc/qemu/authz/ |
H A D | simple.c | 28 const char *identity, in qauthz_simple_is_allowed() argument 33 trace_qauthz_simple_is_allowed(authz, sauthz->identity, identity); in qauthz_simple_is_allowed() 34 return g_str_equal(identity, sauthz->identity); in qauthz_simple_is_allowed() 44 g_free(sauthz->identity); in qauthz_simple_prop_set_identity() 45 sauthz->identity = g_strdup(value); in qauthz_simple_prop_set_identity() 55 return g_strdup(sauthz->identity); in qauthz_simple_prop_get_identity() 64 g_free(sauthz->identity); in qauthz_simple_finalize() 73 if (!sauthz->identity) { in qauthz_simple_complete() 74 error_setg(errp, "The 'identity' property must be set"); in qauthz_simple_complete() 89 object_class_property_add_str(oc, "identity", in qauthz_simple_class_init() [all …]
|
H A D | trace-events | 4 qauthz_is_allowed(void *authz, const char *identity, bool allowed) "AuthZ %p check identity=%s allo… 7 …ar *wantidentity, const char *gotidentity) "AuthZ simple %p check want identity=%s got identity=%s" 10 …k_rule(void *authz, const char *identity, const char *rule, int format, int policy) "AuthZ list %p… 11 …uthz_list_default_policy(void *authz, const char *identity, int policy) "AuthZ list %p default ide… 18 qauthz_pam_check(void *authz, const char *identity, const char *service) "AuthZ PAM %p identity=%s …
|
H A D | base.c | 27 const char *identity, in qauthz_is_allowed() argument 33 allowed = cls->is_allowed(authz, identity, errp); in qauthz_is_allowed() 34 trace_qauthz_is_allowed(authz, identity, allowed); in qauthz_is_allowed() 41 const char *identity, in qauthz_is_allowed_by_id() argument 65 return qauthz_is_allowed(authz, identity, errp); in qauthz_is_allowed_by_id()
|
H A D | pamacct.c | 31 const char *identity, in qauthz_pam_is_allowed() argument 39 trace_qauthz_pam_check(authz, identity, pauthz->service); in qauthz_pam_is_allowed() 41 identity, in qauthz_pam_is_allowed() 54 identity, pam_strerror(pamh, ret)); in qauthz_pam_is_allowed()
|
H A D | list.c | 29 const char *identity, in qauthz_list_is_allowed() argument 40 trace_qauthz_list_check_rule(authz, rule->match, identity, in qauthz_list_is_allowed() 44 if (g_str_equal(rule->match, identity)) { in qauthz_list_is_allowed() 49 if (g_pattern_match_simple(rule->match, identity)) { in qauthz_list_is_allowed() 60 trace_qauthz_list_default_policy(authz, identity, lauthz->policy); in qauthz_list_is_allowed()
|
/openbmc/qemu/include/authz/ |
H A D | base.h | 51 const char *identity, 59 * @identity: the user identity to authorize 62 * Check if a user @identity is authorized. If an error 71 * Returns: true if @identity is authorized, false if denied or if 75 const char *identity, 82 * @identity: the user identity to authorize 85 * Check if a user @identity is authorized. If an error 94 * Returns: true if @identity is authorized, false if denied or if 98 const char *identity,
|
H A D | simple.h | 48 * "identity": "fred" 55 * -object authz-simple,id=authz0,identity=fred 61 char *identity; member 68 const char *identity,
|
/openbmc/linux/Documentation/ABI/testing/ |
D | sysfs-class-typec |
|
D | sysfs-devices-soc |
|
/openbmc/qemu/docs/system/ |
H A D | authz.rst | 8 their identity. If the authorization identity database is scoped to the QEMU 9 client this may be sufficient. It is common, however, for the identity database 14 Identity providers 18 that emit an identity upon completion. 29 the client provide a certificate to the server to prove its own identity. 36 the certificate can be used as an identity in the QEMU authorization 61 based on an exact match against a single identity. This is useful when it is 67 thus be used as the identity to match against. Alternatively if the virtual 80 "identity": "fred" 89 -object authz-simple,id=authz0,identity=fred [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Attestation/ |
H A D | IdentityAuthentication.interface.yaml | 2 Implement to represent properties related to Identity Authentication using 10 The status of the verification of the identity of the component. 17 certificate that provides the requester's identity. 26 certificate that provides the responder's identity.
|
/openbmc/linux/drivers/media/dvb-frontends/ |
D | dib0090.c |
|
/openbmc/qemu/qapi/ |
H A D | authz.json | 45 # @match: a string or glob to match against a user identity 111 # @identity: Identifies the allowed user. Its format depends on the 113 # For authorizing based on TLS x509 certificates, the identity 119 'data': { 'identity': 'str' } }
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/poppler/ |
H A D | poppler-data_0.4.12.bb | 18 ${CMAP_RESOURCES_BASE}/Identity-H;name=idh \ 19 ${CMAP_RESOURCES_BASE}/Identity-V;name=idv" 33 install -m644 ${UNPACKDIR}/Identity-* ${D}${datadir}/poppler/cMap/
|
/openbmc/linux/arch/arm/mm/ |
D | idmap.c |
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
H A D | ComponentIntegrity.v1_3_1.json | 43 …"longDescription": "This object shall contain common identity-related authentication information.", 61 … "description": "A link to the certificate that represents the identity of the component.", 62 … contain a link to a resource of type `Certificate` that represents the identity of the component … 74 … "description": "The status of the verification of the identity of the component.", 75 …on": "This property shall contain the status of the verification of the identity of the component … 529 … "description": "Identity authentication information about the SPDM Requester and SPDM Responder.", 530 …"longDescription": "This object shall contain identity authentication information about the SPDM R… 555 … "description": "Authentication information of the identity of the SPDM Requester.", 556 …iption": "This property shall contain authentication information of the identity of the SPDM Reque… 567 … "description": "Authentication information of the identity of the SPDM Responder.", [all …]
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema-installed/ |
H A D | ComponentIntegrity.v1_3_1.json | 43 …"longDescription": "This object shall contain common identity-related authentication information.", 61 … "description": "A link to the certificate that represents the identity of the component.", 62 … contain a link to a resource of type `Certificate` that represents the identity of the component … 74 … "description": "The status of the verification of the identity of the component.", 75 …on": "This property shall contain the status of the verification of the identity of the component … 529 … "description": "Identity authentication information about the SPDM Requester and SPDM Responder.", 530 …"longDescription": "This object shall contain identity authentication information about the SPDM R… 555 … "description": "Authentication information of the identity of the SPDM Requester.", 556 …iption": "This property shall contain authentication information of the identity of the SPDM Reque… 567 … "description": "Authentication information of the identity of the SPDM Responder.", [all …]
|
/openbmc/linux/include/linux/platform_data/ |
D | mlxreg.h |
|
/openbmc/openbmc/poky/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/ |
H A D | wpa_supplicant.conf | 281 # identity: Identity string for EAP 282 # anonymous_identity: Anonymous identity string for EAP (to be used as the 283 # unencrypted identity with EAP types that support different tunnelled 284 # identity, e.g., EAP-TTLS) 462 identity="user@example.com" 476 identity="user@example.com" 484 # EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the 485 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel. 490 identity="user@example.com" 497 # EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the unencrypted [all …]
|
/openbmc/phosphor-logging/extensions/openpower-pels/ |
H A D | callout.hpp | 30 * * FRU Identity (must be first if present) 49 // Leaving out the various PCE identity ones since 239 * @brief Returns the FRU identity substructure 249 * @brief Returns the PCE identity substructure 259 * @brief Returns the MRU identity substructure 327 * @brief FRU (Field Replaceable Unit) Identity substructure 332 * @brief PCE (Power Controlling Enclosure) Identity substructure
|
/openbmc/linux/Documentation/driver-api/usb/ |
D | typec.rst |
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/ |
H A D | Certificate.interface.yaml | 17 An X.509 certificate contains a public key, validity, and an identity 101 integrity object whose requester's identity is identified by this 111 integrity object whose responder's identity is identified by this
|
/openbmc/openbmc/poky/meta/recipes-devtools/git/git/ |
H A D | fixsort.patch | 10 "sendemail.identity", 11 "sendemail.<identity>.*",
|
/openbmc/sdbusplus/include/sdbusplus/async/stdexec/__detail/ |
H A D | __receiver_ref.hpp | 44 template <class _GetReceiver = std::identity, class _Obj, class _Tag, 71 template <class _OpState, class _GetEnv, class _GetReceiver = std::identity> 100 template <class _OpState, class _GetEnv, class _GetReceiver = std::identity>
|
/openbmc/linux/Documentation/admin-guide/device-mapper/ |
D | linear.rst |
|