/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_policies_sub_menu.robot | 3 Documentation Test OpenBMC GUI "Policies" sub-menu of "Security and Access" menu. 18 ${xpath_policies_heading} //h1[text()="Policies"] 19 ${xpath_bmc_ssh_toggle} //*[@data-test-id='policies-toggle-bmcShell'] 24 ${xpath_virtual_tpm_toggle} //*[@data-test-id='policies-toggle-vtpm'] 25 ${xpath_rtad_toggle} //*[@data-test-id='policies-toggle-rtad'] 26 ${xpath_usb_firmware_update_policy_toggle} //*[@data-test-id='policies-toggle-usbFirmwareUpdateP… 27 ${xpath_secure_version_lockin_toggle} //*[@data-test-id='policies-toggle-svle'] 28 ${xpath_host_usb_enablement_toggle} //*[@data-test-id='policies-toggle-hostUsb'] 33 Verify Navigation To Policies Page 34 [Documentation] Verify navigation to policies page. [all …]
|
/openbmc/openbmc/poky/meta/recipes-devtools/rpm-sequoia/ |
H A D | rpm-sequoia-crypto-policy_git.bb | 2 HOMEPAGE = "https://gitlab.com/redhat-crypto/fedora-crypto-policies/" 8 # Python 3.11+ is needed to build fedora-crypto-policies 12 git://gitlab.com/redhat-crypto/fedora-crypto-policies.git;protocol=https;branch=master \ 24 rm -f $(ls -1 policies/*.pol | grep -v DEFAULT.pol) || echo nothing to delete 36 install -d -m755 ${D}${datadir}/crypto-policies/back-ends 37 …install -m644 ${S}/output/DEFAULT/rpm-sequoia.txt ${D}${datadir}/crypto-policies/back-ends/rpm-seq… 40 FILES:${PN} = "${datadir}/crypto-policies/back-ends/*"
|
/openbmc/phosphor-fan-presence/presence/templates/ |
H A D | generated.hpp.mako | 66 using Policies = std::array<std::unique_ptr<RedundancyPolicy>, ${len(policies)}>; 70 static const Policies policies = 72 % for p in policies: 76 return policies;
|
/openbmc/webui-vue/src/views/SecurityAndAccess/Policies/ |
H A D | Policies.vue | 17 data-test-id="policies-toggle-bmcShell" 67 data-test-id="policies-toggle-vtpm" 92 data-test-id="policies-toggle-rtad" 144 name: 'Policies', 169 return this.$store.getters['policies/sshProtocolEnabled']; 177 return this.$store.getters['policies/ipmiProtocolEnabled']; 185 if (this.$store.getters['policies/rtadEnabled'] === 'Enabled') { 197 if (this.$store.getters['policies/vtpmEnabled'] === 'Enabled') { 209 return this.$store.getters['policies/getSessionTimeoutValue']; 219 this.$store.dispatch('policies/getBiosStatus'), [all …]
|
H A D | index.js | 1 import Policies from './Policies.vue'; 2 export default Policies;
|
/openbmc/phosphor-fan-presence/presence/ |
H A D | json_parser.hpp | 30 using policies = std::vector<std::unique_ptr<RedundancyPolicy>>; typedef 61 * @brief Get the json config based fan presence policies 63 * @return - The fan presence policies 65 static const policies& get(); 78 * @brief Parses and populates the fan presence policies from 85 /* Fan presence policies */ 86 static policies _policies; 91 /* List of Fan objects to have presence policies */ 115 * policies. 163 * Redundancy policies for fan presence detection function declarations
|
H A D | json_parser.cpp | 45 policies JsonConfig::_policies; 73 const policies& JsonConfig::get() in get() 105 policies policies; in process() local 197 policies.emplace_back(std::move(policy)); in process() 201 // Success, refresh fans and policies lists in process() 206 _policies.swap(policies); in process() 334 * Redundancy policies for fan presence detection function definitions
|
/openbmc/webui-vue/src/env/router/ |
H A D | intel.js | 20 import Policies from '@/views/SecurityAndAccess/Policies'; 158 path: '/security-and-access/policies', 159 name: 'policies', 160 component: Policies, 162 title: i18n.global.t('appPageTitle.policies'),
|
H A D | ibm.js | 21 import Policies from '@/views/SecurityAndAccess/Policies'; 163 path: '/security-and-access/policies', 164 name: 'policies', 165 component: Policies, 167 title: i18n.global.t('appPageTitle.policies'),
|
/openbmc/webui-vue/src/router/ |
H A D | routes.js | 23 import Policies from '@/views/SecurityAndAccess/Policies'; 181 path: '/security-and-access/policies', 182 name: 'policies', 183 component: Policies, 185 title: i18n.global.t('appPageTitle.policies'),
|
/openbmc/ibm-logging/ |
H A D | policy_table.cpp | 67 policies.emplace(policy["err"], std::move(detailsList)); in load() 87 auto policy = policies.find(error); in find() 89 if (policy != policies.end()) in find()
|
/openbmc/webui-vue/src/env/components/AppNavigation/ |
H A D | intel.js | 144 id: 'policies', 145 label: i18n.global.t('appNavigation.policies'), 146 route: '/security-and-access/policies',
|
H A D | ibm.js | 119 id: 'policies', 120 label: i18n.global.t('appNavigation.policies'), 121 route: '/security-and-access/policies',
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
H A D | KeyService.v1_0_1.json | 5 …4-2024 DMTF. For the full DMTF copyright policy, see http://www.dmtf.org/about/policies/copyright", 87 "description": "The NVMe-oF key policies maintained by this service.", 88 … collection of type `KeyPolicyCollection` that contains the NVMe-oF key policies maintained by thi…
|
H A D | Privileges.v1_0_6.json | 4 …4-2024 DMTF. For the full DMTF copyright policy, see http://www.dmtf.org/about/policies/copyright",
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/vlock/vlock-2.2.3/ |
H A D | vlock_pam | 1 # Use the default auth and account policies for vlock
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Control/Boot/ |
H A D | RebootPolicy.interface.yaml | 2 Implement to set common reboot policies.
|
/openbmc/webui-vue/src/components/AppNavigation/ |
H A D | AppNavigationMixin.js | 173 id: 'policies', 174 label: i18n.global.t('appNavigation.policies'), 175 route: '/security-and-access/policies',
|
/openbmc/u-boot/arch/arm/mach-socfpga/ |
H A D | misc_arria10.c | 61 + * This function initializes security policies to be consistent across 64 + * The idea is to set all security policies to be normal, nonsecure
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema-installed/ |
H A D | Privileges.v1_0_6.json | 4 …4-2024 DMTF. For the full DMTF copyright policy, see http://www.dmtf.org/about/policies/copyright",
|
/openbmc/qemu/docs/interop/ |
H A D | dbus.rst | 51 dbus-daemon can enforce various policies based on the UID/GID of the 53 helpers as different UID from QEMU and set appropriate policies.
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Control/Power/ |
H A D | RestorePolicy.interface.yaml | 22 Possible power restoration policies.
|
/openbmc/openbmc/meta-security/recipes-mac/smack/smack/ |
H A D | smack_generator_make_fixup.patch | 17 policies: ./generator ./make_policies.bash
|
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/ |
H A D | KeyService_v1.xml | 9 <!--# For the full DMTF copyright policy, see http://www.dmtf.org/about/policies/copyright --> 82 …<Annotation Term="OData.Description" String="The NVMe-oF key policies maintained by this service."… 83 … collection of type `KeyPolicyCollection` that contains the NVMe-oF key policies maintained by thi…
|
/openbmc/openbmc-test-automation/redfish/service_root/ |
H A D | test_service_root_security.robot | 20 ... X-Permitted-Cross-Domain-Policies=none 127 # X-Permitted-Cross-Domain-Policies: none 148 # [X-Permitted-Cross-Domain-Policies]: none
|