/openbmc/webui-vue/src/views/SecurityAndAccess/Certificates/ |
H A D | index.js | 1 import Certificates from './Certificates.vue'; 2 export default Certificates;
|
H A D | Certificates.vue | 120 name: 'Certificates',
|
/openbmc/linux/crypto/asymmetric_keys/ |
H A D | pkcs7.asn1 | 14 certSequence [2] IMPLICIT Certificates 41 -- Certificates and certificate lists 52 Certificates ::= SEQUENCE OF Certificate
|
/openbmc/openbmc-test-automation/docs/ |
H A D | certificate_generate.md | 54 "@odata.id": "/redfish/v1/Managers/${MANAGER_ID}/NetworkProtocol/HTTPS/Certificates/" 71 "@odata.id": "/redfish/v1/Managers/${MANAGER_ID}/NetworkProtocol/HTTPS/Certificates/" 89 "@odata.id": "/redfish/v1/Managers/${MANAGER_ID}/NetworkProtocol/HTTPS/Certificates/" 137 "@odata.id": "/redfish/v1/Managers/${MANAGER_ID}/NetworkProtocol/HTTPS/Certificates/1" 151 "@odata.id": "/redfish/v1/Managers/${MANAGER_ID}/NetworkProtocol/HTTPS/Certificates/1",
|
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_multiple_interfaces.robot | 44 Load Certificates Via Eth1 IP Address And Verify 47 [Template] Load Certificates On BMC Via GUI 66 Load Certificates On BMC Via GUI
|
H A D | test_certificates_sub_menu.robot | 3 Documentation Test OpenBMC GUI "Certificates" sub-menu of "Security and access". 16 ${xpath_certificate_heading} //h1[text()="Certificates"]
|
/openbmc/openbmc-test-automation/lib/ |
H A D | bmc_ldap_utils.robot | 45 # 'Certificates': 47 # '@odata.id': u'/redfish/v1/AccountService/LDAP/Certificates'
|
H A D | protocol_setting_utils.robot | 65 # "Certificates": { 66 # "@odata.id": "/redfish/v1/Managers/${MANAGER_ID}/NetworkProtocol/HTTPS/Certificates"
|
H A D | certificate_utils.robot | 22 # e.g. "/redfish/v1/AccountService/LDAP/Certificates". 167 …t_list}= Redfish_Utils.Get Member List /redfish/v1/Managers/${MANAGER_ID}/Truststore/Certificates
|
/openbmc/bmcweb/ |
H A D | Redfish.md | 65 - MultiFactorAuth/ClientCertificate/Certificates 77 ### /redfish/v1/AccountService/MultiFactorAuth/ClientCertificate/Certificates 82 ### /redfish/v1/AccountService/MultiFactorAuth/ClientCertificate/Certificates/{Certificate} 148 ### /redfish/v1/AccountService/LDAP/Certificates/ 211 - Links/Certificates 212 - Links/Certificates@odata.count 677 ### /redfish/v1/Managers/bmc/NetworkProtocol/HTTPS/Certificates/ 685 ### /redfish/v1/Managers/bmc/NetworkProtocol/HTTPS/Certificates/{CertificateId}/ 697 ### /redfish/v1/Managers/bmc/Truststore/Certificates/
|
/openbmc/webui-vue/src/env/router/ |
H A D | intel.js | 25 import Certificates from '@/views/SecurityAndAccess/Certificates'; 168 component: Certificates,
|
H A D | ibm.js | 27 import Certificates from '@/views/SecurityAndAccess/Certificates'; 173 component: Certificates,
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/ |
H A D | README.md | 71 ### User flow for generating and installing Certificates(CSR Based) 127 "/redfish/v1/Managers/bmc/NetworkProtocol/HTTPS/Certificates/", 198 "/redfish/v1/Managers/bmc/NetworkProtocol/HTTPS/Certificates" 202 URI /redfish/v1/Managers/bmc/NetworkProtocol/HTTPS/Certificates mapped to 219 /redfish/v1/Managers/bmc/NetworkProtocol/HTTPS/Certificates/1 ID of the 230 /redfish/v1/Managers/bmc/NetworkProtocol/HTTPS/Certificates/1 is mapped to 258 url: redfish/v1/Managers/bmc/Truststore/Certificates/1
|
/openbmc/webui-vue/src/store/modules/SecurityAndAccess/ |
H A D | CertificatesStore.js | 69 Links: { Certificates }, field in AnonymousClass3283684f0601.data.Links 71 }) => Certificates.map((certificate) => certificate['@odata.id']),
|
/openbmc/webui-vue/src/router/ |
H A D | routes.js | 29 import Certificates from '@/views/SecurityAndAccess/Certificates'; 181 component: Certificates,
|
/openbmc/openbmc-test-automation/redfish/managers/ |
H A D | test_certificate.robot | 87 …t_list}= Redfish_Utils.Get Member List /redfish/v1/Managers/${MANAGER_ID}/Truststore/Certificates 128 ... @odata.id=/redfish/v1/Managers/${MANAGER_ID}/NetworkProtocol/HTTPS/Certificates/1 231 Verify Certificates Location Via Redfish 242 ... /redfish/v1/Managers/${MANAGER_ID}/Truststore/Certificates/${cert_id} 245 FOR ${Certificates_dict} IN @{Links['Certificates']}
|
/openbmc/docs/security/ |
H A D | TLS-configuration.md | 18 ## Certificates section in How to configure the server TLS certificates for authentication 357 …tent-Type: application/json" -X POST https://${bmc}/redfish/v1/Managers/bmc/Truststore/Certificates 368 curl --user root:0penBmc -k https://${bmc}/redfish/v1/Managers/bmc/Truststore/Certificates 383 "@odata.id": "/redfish/v1/Managers/bmc/NetworkProtocol/HTTPS/Certificates/1" 443 - Certificates do not meet the requirements. See paragraphs
|
/openbmc/openbmc/poky/meta/recipes-support/ca-certificates/ |
H A D | ca-certificates_20211016.bb | 4 This derived from Debian's CA Certificates."
|
/openbmc/qemu/docs/interop/ |
H A D | nbd.rst | 69 ``NBD_OPT_STARTTLS`` with TLS X.509 Certificates
|
/openbmc/docs/designs/ |
H A D | redfish-tls-user-authentication.md | 102 `/redfish/v1/AccountService/TLSAuth/Certificates`. There can be more than one, 126 "CertificateUri": "/redfish/v1/AccountService/TLSAuth/Certificates/1",
|
H A D | redfish-spdm-attestation.md | 225 `/redfish/v1/Chassis/{ChassisId}/Certificates/`. Existing cert manager 236 `TrustedComponent` and `Certificates`. The corresponding URI are specified as 241 - `/redfish/v1/Chassis/{ChassisId}/Certificates/`
|
/openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
H A D | test_redfishtool_certificate.robot | 141 ... @odata.id=/redfish/v1/Managers/${MANAGER_ID}/NetworkProtocol/HTTPS/Certificates/1 293 ${cmd_output}= Redfishtool Get /redfish/v1/Managers/${MANAGER_ID}/Truststore/Certificates 342 # e.g. "/redfish/v1/AccountService/LDAP/Certificates".
|
/openbmc/phosphor-webui/app/access-control/controllers/ |
H A D | certificate-controller.js | 41 var locations = data.Links.Certificates;
|
/openbmc/docs/designs/management-console/ |
H A D | Authorities_List_Management.md | 90 Certificates) and implement its standalone manager daemon. It has less impact in
|
/openbmc/linux/certs/ |
H A D | Kconfig | 2 menu "Certificates for signature checking"
|