/openbmc/openbmc-test-automation/redfish/managers/ |
H A D | test_certificate.robot | 10 Test Tags Certificate 25 Verify Server Certificate Replace 37 Verify Client Certificate Replace 49 Verify CA Certificate Replace 59 Verify Client Certificate Install 71 Verify CA Certificate Install 92 Install And Verify Certificate Via Redfish CA Valid Certificate ok ${FALSE} 97 Install And Verify Certificate Via Redfish CA Valid Certificate error ${FALSE} 105 ${cert_file_path}= Generate Certificate File Via Openssl Valid Certificate 365 123 ${cert_file_path}= Generate Certificate File Via Openssl Valid Certificate Valid Privatekey [all …]
|
H A D | test_multiple_interfaces.robot | 170 [Template] Install Certificate Via Redfish And Verify 173 CA Valid Certificate ok 174 Client Valid Certificate Valid Privatekey ok 286 Install Certificate Via Redfish And Verify 292 # cert_type Certificate type (e.g. "Client" or "CA"). 293 # cert_format Certificate file format 297 # delete_cert Certificate will be deleted before installing if this True. 303 ... Delete All CA Certificate Via Redfish 305 ... Delete Certificate Via BMC CLI ${cert_type} 307 ${cert_file_path}= Generate Certificate File Via Openssl ${cert_format} [all …]
|
/openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
H A D | test_redfishtool_certificate.robot | 35 Verify Redfishtool Replace Certificate Server Valid Certificate Valid Privatekey ok 42 Verify Redfishtool Replace Certificate Client Valid Certificate Valid Privatekey ok 49 Verify Redfishtool Replace Certificate CA Valid Certificate ok 56 Verify Redfishtool Install Certificate Client Valid Certificate Valid Privatekey ok 63 Verify Redfishtool Install Certificate CA Valid Certificate ok 91 CA Empty Certificate error 110 CA Empty Certificate error 118 ${cert_file_path}= Generate Certificate File Via Openssl Valid Certificate 365 136 ${cert_file_path}= Generate Certificate File Via Openssl Valid Certificate Valid Privatekey 246 Verify Redfishtool Install Certificate [all …]
|
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_certificates_sub_menu.robot | 35 Verify Navigation To Certificate Page 46 Page should contain Certificate 79 Verify Installed CA Certificate 87 Install And Verify Certificate Via Redfish CA Valid Certificate ok 94 Verify Installed HTTPS Certificate 100 Replace Certificate Via Redfish Server Valid Certificate Valid Privatekey ok 107 Verify Installed LDAP Certificate 116 Install And Verify Certificate Via Redfish Client Valid Certificate Valid Privatekey ok 126 Generate Certificate File Data 135 ... Generate Certificate File Via Openssl Valid Certificate Valid Privatekey [all …]
|
H A D | test_multiple_interfaces.robot | 73 # certificate_type Certificate type. 74 # (e.g. "LDAP Certificate" or "CA Certificate"). 75 # file_path Certificate file path (e.g. "/home/folder/file.pem"). 79 ... Delete All CA Certificate Via Redfish 81 ... Delete Certificate Via BMC CLI ${certificate_type} 85 Navigate To SSL Certificate Page 91 ... Select From List By Label ${xpath_certificate_type} CA Certificate 101 ... Wait Until Page Contains Successfully added CA Certificate. 103 ... Wait Until Page Contains Successfully added LDAP Certificate. 107 Navigate To SSL Certificate Page [all …]
|
/openbmc/phosphor-certificate-manager/ |
H A D | certificate.hpp | 66 sdbusplus::xyz::openbmc_project::Certs::server::Certificate, 82 class Certificate : public internal::CertificateInterface class 85 Certificate() = delete; 86 Certificate(const Certificate&) = delete; 87 Certificate& operator=(const Certificate&) = delete; 88 Certificate(Certificate&&) = delete; 89 Certificate& operator=(Certificate&&) = delete; 90 virtual ~Certificate(); 102 Certificate(sdbusplus::bus_t& bus, const std::string& objPath, 122 Certificate(sdbusplus::bus_t& bus, const std::string& objPath,
|
H A D | certificate.cpp | 160 std::string Certificate::generateAuthCertFileX509Path( in generateAuthCertFileX509Path() 222 Certificate::Certificate(sdbusplus::bus_t& bus, const std::string& objPath, in Certificate() function in phosphor::certs::Certificate 260 Certificate::Certificate(sdbusplus::bus_t& bus, const std::string& objPath, in Certificate() function in phosphor::certs::Certificate 280 Certificate::~Certificate() in ~Certificate() 436 void Certificate::populateProperties() in populateProperties() 442 std::string Certificate::getCertId() const in getCertId() 453 void Certificate::storageUpdate() in storageUpdate() 481 void Certificate::populateProperties(X509& cert) in populateProperties() 683 void Certificate::delete_() in delete_() 688 std::string Certificate::getObjectPath() in getObjectPath() [all …]
|
H A D | certs_manager.hpp | 109 void deleteCertificate(const Certificate* const certificate); 113 void replaceCertificate(Certificate* const certificate, 202 std::vector<std::unique_ptr<Certificate>>& getCertificates(); 305 const Certificate* const certToDrop = nullptr); 326 std::vector<std::unique_ptr<Certificate>> installedCerts;
|
H A D | certs_manager.cpp | 268 installedCerts.emplace_back(std::make_unique<Certificate>( in install() 316 fs::path tempPath = Certificate::generateUniqueFilePath(authorityStore); in installAll() 319 Certificate::copyCertificate(sourceFile, in installAll() 321 std::vector<std::unique_ptr<Certificate>> tempCertificates; in installAll() 328 tempCertificates.emplace_back(std::make_unique<Certificate>( in installAll() 400 void Manager::deleteCertificate(const Certificate* const certificate) in deleteCertificate() 402 const std::vector<std::unique_ptr<Certificate>>::iterator& certIt = in deleteCertificate() 421 void Manager::replaceCertificate(Certificate* const certificate, in replaceCertificate() 531 std::vector<std::unique_ptr<Certificate>>& Manager::getCertificates() in getCertificates() 988 installedCerts.emplace_back(std::make_unique<Certificate>( in createCertificates() [all …]
|
H A D | README.md | 3 Certificate management allows to replace the existing certificate and private 4 key file with another (possibly CA signed) Certificate key file. Certificate
|
/openbmc/openbmc-test-automation/openpower/ext_interfaces/ |
H A D | test_vmicert_management.robot | 36 [Template] Get Certificate Signed By VMI 51 Get Root Certificate Using Different Privilege Users Role 54 [Template] Get Root Certificate 76 [Template] Get Certificate Signed By VMI 94 [Template] Get Certificate Signed By VMI 109 Get Root Certificate When VMI Is Off And Verify 115 [Template] Get Root Certificate 130 Get Root Certificate After BMC Reboot And Verify 134 [Template] Get Root Certificate 625 Get Root Certificate [all …]
|
/openbmc/openbmc-test-automation/lib/ |
H A D | certificate_utils.robot | 2 Documentation Certificate utilities keywords. 16 Install Certificate File On BMC 62 Get Certificate File Content From BMC 75 Generate Certificate File Via Openssl 133 Get Certificate Content From File 153 Verify Certificate Visible Via OpenSSL 165 Delete All CA Certificate Via Redfish 175 Delete Certificate Via BMC CLI 201 Replace Certificate Via Redfish 214 …... Install And Verify Certificate Via Redfish ${cert_type} Valid Certificate Valid Privateke… [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/ |
H A D | README.md | 1 # BMC Certificate management 12 ### Signed Certificate upload Design flow(Pre-generated) 186 ### Redfish Certificate Support 188 #### Certificate Upload 205 the Certificate Manager. 207 and creates a Certificate object. 214 received from the Certificate Manager. 222 #### Certificate Replace 228 - Redfish Certificate Collection URI is mapped to corresponding Certificate 244 ### Errors thrown by Certificate Manager [all …]
|
H A D | Authority.interface.yaml | 2 Signs Certificate Signing Request. 12 Should be a valid PEM encoded Certificate signing request
|
/openbmc/openbmc-test-automation/gui/test/access_control/ |
H A D | test_obmc_gui_certificate.robot | 3 Documentation Test OpenBMC GUI "Certificate management" sub-menu of 21 Verify Existence Of All Sections In Certificate Page 25 Page should contain Certificate 30 Verify Existence Of Add Certificate Button
|
/openbmc/linux/crypto/asymmetric_keys/ |
H A D | pkcs7.asn1 | 46 certificate Certificate, -- X.509 50 ExtendedCertificate ::= Certificate -- cheating 52 Certificates ::= SEQUENCE OF Certificate 56 CertificateList ::= SEQUENCE OF Certificate -- This may be defined incorrectly 60 Certificate ::= ANY ({ pkcs7_extract_cert }) -- X.509
|
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/Certs/Certificate/ |
H A D | meson.build | 4 input: [ '../../../../../yaml/xyz/openbmc_project/Certs/Certificate.interface.yaml', ], 12 'xyz/openbmc_project/Certs/Certificate',
|
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/Certs/ |
H A D | meson.build | 46 subdir('Certificate') subdir 49 input: [ '../../../../yaml/xyz/openbmc_project/Certs/Certificate.interface.yaml', ], 50 output: [ 'Certificate.md' ], 57 'xyz/openbmc_project/Certs/Certificate',
|
/openbmc/docs/designs/ |
H A D | redfish-tls-user-authentication.md | 19 Redfish currently lacks support for modern authentication methods. Certificate 26 - [Certificate Schema Definition](https://redfish.dmtf.org/schemas/v1/Certificate_v1.xml) 29 - [DSP-IS0008 DMTF's Redfish Certificate Management Document](https://www.dmtf.org/dsp/DSP-IS0008) 63 │ │ Upload CA Certificate │ 99 #### Uploading CA Certificate 111 "CertificateString": "... <Certificate String> ...", 127 "CertificateString": "... <Certificate String> ...", 201 Certificate based authentication has the highest priority, because of the design 237 to use at least 2048bit RSA or 256/384bit elliptic curve keys. Certificate has
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Attestation/ |
H A D | IdentityAuthentication.interface.yaml | 20 - xyz.openbmc_project.Certs.Certificate 29 - xyz.openbmc_project.Certs.Certificate
|
H A D | MeasurementSet.interface.yaml | 30 - name: Certificate 33 Certificate corresponding to the SPDM slot identifier that can
|
/openbmc/openbmc-test-automation/test_lists/witherspoon/ |
H A D | regression_bucket_master | 54 # Certificate 55 --include Certificate
|
/openbmc/phosphor-user-manager/docs/ |
H A D | README.md | 29 #### Upload LDAP Client Certificate 36 #### Upload CA Certificate
|
/openbmc/docs/designs/management-console/ |
H A D | VMI_Certificate_Exchange.md | 1 # VMI Certificate Exchange 127 “Certificate”: "<certificate string>" 139 curl -k -H "X-Auth-Token: <token>" -X GET http://{BMC_IP}/ibm/v1/Host/Certificate/root 147 “Certificate”: "<certificate string>" 161 - Certificate Signing Request CSR is a message sent from an applicant to a 163 - The user calls CSR interface BMC creates new private key and CSR Certificate 257 - Certificate exchange fails in the following scenarios
|
/openbmc/openbmc-test-automation/docs/ |
H A D | certificate_generate.md | 150 "@odata.context": "/redfish/v1/$metadata#Certificate.Certificate", 152 "@odata.type": "#Certificate.v1_0_0.Certificate",
|