Home
last modified time | relevance | path

Searched refs:Certificate (Results 1 – 25 of 83) sorted by relevance

1234

/openbmc/openbmc-test-automation/redfish/managers/
H A Dtest_certificate.robot10 Test Tags Certificate
25 Verify Server Certificate Replace
37 Verify Client Certificate Replace
49 Verify CA Certificate Replace
59 Verify Client Certificate Install
71 Verify CA Certificate Install
92 Install And Verify Certificate Via Redfish CA Valid Certificate ok ${FALSE}
97 Install And Verify Certificate Via Redfish CA Valid Certificate error ${FALSE}
105 ${cert_file_path}= Generate Certificate File Via Openssl Valid Certificate 365
123 ${cert_file_path}= Generate Certificate File Via Openssl Valid Certificate Valid Privatekey
[all …]
H A Dtest_multiple_interfaces.robot168 [Template] Install Certificate Via Redfish And Verify
171 CA Valid Certificate ok
172 Client Valid Certificate Valid Privatekey ok
251 Install Certificate Via Redfish And Verify
257 # cert_type Certificate type (e.g. "Client" or "CA").
258 # cert_format Certificate file format
262 # delete_cert Certificate will be deleted before installing if this True.
268 ... Delete All CA Certificate Via Redfish
270 ... Delete Certificate Via BMC CLI ${cert_type}
272 ${cert_file_path}= Generate Certificate File Via Openssl ${cert_format}
[all …]
/openbmc/openbmc-test-automation/redfish/dmtf_tools/
H A Dtest_redfishtool_certificate.robot35 Verify Redfishtool Replace Certificate Server Valid Certificate Valid Privatekey ok
42 Verify Redfishtool Replace Certificate Client Valid Certificate Valid Privatekey ok
49 Verify Redfishtool Replace Certificate CA Valid Certificate ok
56 Verify Redfishtool Install Certificate Client Valid Certificate Valid Privatekey ok
63 Verify Redfishtool Install Certificate CA Valid Certificate ok
91 CA Empty Certificate error
110 CA Empty Certificate error
118 ${cert_file_path}= Generate Certificate File Via Openssl Valid Certificate 365
136 ${cert_file_path}= Generate Certificate File Via Openssl Valid Certificate Valid Privatekey
246 Verify Redfishtool Install Certificate
[all …]
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/
H A Dtest_certificates_sub_menu.robot35 Verify Navigation To Certificate Page
46 Page should contain Certificate
79 Verify Installed CA Certificate
87 Install And Verify Certificate Via Redfish CA Valid Certificate ok
94 Verify Installed HTTPS Certificate
100 Replace Certificate Via Redfish Server Valid Certificate Valid Privatekey ok
107 Verify Installed LDAP Certificate
116 Install And Verify Certificate Via Redfish Client Valid Certificate Valid Privatekey ok
126 Generate Certificate File Data
135 ... Generate Certificate File Via Openssl Valid Certificate Valid Privatekey
[all …]
H A Dtest_multiple_interfaces.robot73 # certificate_type Certificate type.
74 # (e.g. "LDAP Certificate" or "CA Certificate").
75 # file_path Certificate file path (e.g. "/home/folder/file.pem").
79 ... Delete All CA Certificate Via Redfish
81 ... Delete Certificate Via BMC CLI ${certificate_type}
85 Navigate To SSL Certificate Page
91 ... Select From List By Label ${xpath_certificate_type} CA Certificate
101 ... Wait Until Page Contains Successfully added CA Certificate.
103 ... Wait Until Page Contains Successfully added LDAP Certificate.
107 Navigate To SSL Certificate Page
[all …]
/openbmc/phosphor-certificate-manager/
H A Dcertificate.hpp66 sdbusplus::xyz::openbmc_project::Certs::server::Certificate,
82 class Certificate : public internal::CertificateInterface class
85 Certificate() = delete;
86 Certificate(const Certificate&) = delete;
87 Certificate& operator=(const Certificate&) = delete;
88 Certificate(Certificate&&) = delete;
89 Certificate& operator=(Certificate&&) = delete;
90 virtual ~Certificate();
102 Certificate(sdbusplus::bus_t& bus, const std::string& objPath,
122 Certificate(sdbusplus::bus_t& bus, const std::string& objPath,
H A Dcertificate.cpp157 std::string Certificate::generateAuthCertFileX509Path( in generateAuthCertFileX509Path()
219 Certificate::Certificate(sdbusplus::bus_t& bus, const std::string& objPath, in Certificate() function in phosphor::certs::Certificate
257 Certificate::Certificate(sdbusplus::bus_t& bus, const std::string& objPath, in Certificate() function in phosphor::certs::Certificate
277 Certificate::~Certificate() in ~Certificate()
433 void Certificate::populateProperties() in populateProperties()
439 std::string Certificate::getCertId() const in getCertId()
450 void Certificate::storageUpdate() in storageUpdate()
478 void Certificate::populateProperties(X509& cert) in populateProperties()
680 void Certificate::delete_() in delete_()
685 std::string Certificate::getObjectPath() in getObjectPath()
[all …]
H A Dcerts_manager.hpp109 void deleteCertificate(const Certificate* const certificate);
113 void replaceCertificate(Certificate* const certificate,
202 std::vector<std::unique_ptr<Certificate>>& getCertificates();
305 const Certificate* const certToDrop = nullptr);
326 std::vector<std::unique_ptr<Certificate>> installedCerts;
H A Dcerts_manager.cpp268 installedCerts.emplace_back(std::make_unique<Certificate>( in install()
318 fs::path tempPath = Certificate::generateUniqueFilePath(authorityStore); in installAll()
321 Certificate::copyCertificate(sourceFile, in installAll()
323 std::vector<std::unique_ptr<Certificate>> tempCertificates; in installAll()
330 tempCertificates.emplace_back(std::make_unique<Certificate>( in installAll()
402 void Manager::deleteCertificate(const Certificate* const certificate) in deleteCertificate()
404 const std::vector<std::unique_ptr<Certificate>>::iterator& certIt = in deleteCertificate()
423 void Manager::replaceCertificate(Certificate* const certificate, in replaceCertificate()
533 std::vector<std::unique_ptr<Certificate>>& Manager::getCertificates() in getCertificates()
989 installedCerts.emplace_back(std::make_unique<Certificate>( in createCertificates()
[all …]
H A DREADME.md3 Certificate management allows to replace the existing certificate and private
4 key file with another (possibly CA signed) Certificate key file. Certificate
/openbmc/openbmc-test-automation/openpower/ext_interfaces/
H A Dtest_vmicert_management.robot36 [Template] Get Certificate Signed By VMI
51 Get Root Certificate Using Different Privilege Users Role
54 [Template] Get Root Certificate
76 [Template] Get Certificate Signed By VMI
94 [Template] Get Certificate Signed By VMI
109 Get Root Certificate When VMI Is Off And Verify
115 [Template] Get Root Certificate
130 Get Root Certificate After BMC Reboot And Verify
134 [Template] Get Root Certificate
625 Get Root Certificate
[all …]
/openbmc/openbmc-test-automation/lib/
H A Dcertificate_utils.robot2 Documentation Certificate utilities keywords.
16 Install Certificate File On BMC
62 Get Certificate File Content From BMC
75 Generate Certificate File Via Openssl
133 Get Certificate Content From File
153 Verify Certificate Visible Via OpenSSL
165 Delete All CA Certificate Via Redfish
175 Delete Certificate Via BMC CLI
201 Replace Certificate Via Redfish
214 …... Install And Verify Certificate Via Redfish ${cert_type} Valid Certificate Valid Privateke…
[all …]
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/
H A DREADME.md1 # BMC Certificate management
12 ### Signed Certificate upload Design flow(Pre-generated)
186 ### Redfish Certificate Support
188 #### Certificate Upload
205 the Certificate Manager.
207 and creates a Certificate object.
214 received from the Certificate Manager.
222 #### Certificate Replace
228 - Redfish Certificate Collection URI is mapped to corresponding Certificate
244 ### Errors thrown by Certificate Manager
[all …]
H A DAuthority.interface.yaml2 Signs Certificate Signing Request.
12 Should be a valid PEM encoded Certificate signing request
/openbmc/openbmc-test-automation/gui/test/access_control/
H A Dtest_obmc_gui_certificate.robot3 Documentation Test OpenBMC GUI "Certificate management" sub-menu of
21 Verify Existence Of All Sections In Certificate Page
25 Page should contain Certificate
30 Verify Existence Of Add Certificate Button
/openbmc/linux/crypto/asymmetric_keys/
H A Dpkcs7.asn146 certificate Certificate, -- X.509
50 ExtendedCertificate ::= Certificate -- cheating
52 Certificates ::= SEQUENCE OF Certificate
56 CertificateList ::= SEQUENCE OF Certificate -- This may be defined incorrectly
60 Certificate ::= ANY ({ pkcs7_extract_cert }) -- X.509
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/Certs/Certificate/
H A Dmeson.build4 input: [ '../../../../../yaml/xyz/openbmc_project/Certs/Certificate.interface.yaml', ],
12 'xyz/openbmc_project/Certs/Certificate',
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/Certs/
H A Dmeson.build46 subdir('Certificate') subdir
49 input: [ '../../../../yaml/xyz/openbmc_project/Certs/Certificate.interface.yaml', ],
50 output: [ 'Certificate.md' ],
57 'xyz/openbmc_project/Certs/Certificate',
/openbmc/docs/designs/
H A Dredfish-tls-user-authentication.md19 Redfish currently lacks support for modern authentication methods. Certificate
26 - [Certificate Schema Definition](https://redfish.dmtf.org/schemas/v1/Certificate_v1.xml)
29 - [DSP-IS0008 DMTF's Redfish Certificate Management Document](https://www.dmtf.org/dsp/DSP-IS0008)
63 │ │ Upload CA Certificate
99 #### Uploading CA Certificate
111 "CertificateString": "... <Certificate String> ...",
127 "CertificateString": "... <Certificate String> ...",
201 Certificate based authentication has the highest priority, because of the design
237 to use at least 2048bit RSA or 256/384bit elliptic curve keys. Certificate has
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Attestation/
H A DIdentityAuthentication.interface.yaml20 - xyz.openbmc_project.Certs.Certificate
29 - xyz.openbmc_project.Certs.Certificate
H A DMeasurementSet.interface.yaml30 - name: Certificate
33 Certificate corresponding to the SPDM slot identifier that can
/openbmc/openbmc-test-automation/test_lists/witherspoon/
H A Dregression_bucket_master54 # Certificate
55 --include Certificate
/openbmc/phosphor-user-manager/docs/
H A DREADME.md29 #### Upload LDAP Client Certificate
36 #### Upload CA Certificate
/openbmc/docs/designs/management-console/
H A DVMI_Certificate_Exchange.md1 # VMI Certificate Exchange
127Certificate”: "<certificate string>"
139 curl -k -H "X-Auth-Token: <token>" -X GET http://{BMC_IP}/ibm/v1/Host/Certificate/root
147Certificate”: "<certificate string>"
161 - Certificate Signing Request CSR is a message sent from an applicant to a
163 - The user calls CSR interface BMC creates new private key and CSR Certificate
257 - Certificate exchange fails in the following scenarios
/openbmc/openbmc-test-automation/docs/
H A Dcertificate_generate.md150 "@odata.context": "/redfish/v1/$metadata#Certificate.Certificate",
152 "@odata.type": "#Certificate.v1_0_0.Certificate",

1234