| /openbmc/qemu/tests/unit/ |
| H A D | test-authz-list.c | 28 QAuthZList *auth = qauthz_list_new("auth0", in test_authz_default_deny() local 32 g_assert(!qauthz_is_allowed(QAUTHZ(auth), "fred", &error_abort)); in test_authz_default_deny() 34 object_unparent(OBJECT(auth)); in test_authz_default_deny() 39 QAuthZList *auth = qauthz_list_new("auth0", in test_authz_default_allow() local 43 g_assert(qauthz_is_allowed(QAUTHZ(auth), "fred", &error_abort)); in test_authz_default_allow() 45 object_unparent(OBJECT(auth)); in test_authz_default_allow() 50 QAuthZList *auth = qauthz_list_new("auth0", in test_authz_explicit_deny() local 54 qauthz_list_append_rule(auth, "fred", QAUTHZ_LIST_POLICY_DENY, in test_authz_explicit_deny() 57 g_assert(!qauthz_is_allowed(QAUTHZ(auth), "fred", &error_abort)); in test_authz_explicit_deny() 59 object_unparent(OBJECT(auth)); in test_authz_explicit_deny() [all …]
|
| H A D | test-authz-listfile.c | 53 QAuthZListFile *auth = qauthz_list_file_new("auth0", in test_authz_default_deny() local 59 g_assert(!qauthz_is_allowed(QAUTHZ(auth), "fred", &error_abort)); in test_authz_default_deny() 61 object_unparent(OBJECT(auth)); in test_authz_default_deny() 71 QAuthZListFile *auth = qauthz_list_file_new("auth0", in test_authz_default_allow() local 77 g_assert(qauthz_is_allowed(QAUTHZ(auth), "fred", &error_abort)); in test_authz_default_allow() 79 object_unparent(OBJECT(auth)); in test_authz_default_allow() 93 QAuthZListFile *auth = qauthz_list_file_new("auth0", in test_authz_explicit_deny() local 100 g_assert(!qauthz_is_allowed(QAUTHZ(auth), "fred", &error_abort)); in test_authz_explicit_deny() 102 object_unparent(OBJECT(auth)); in test_authz_explicit_deny() 116 QAuthZListFile *auth = qauthz_list_file_new("auth0", in test_authz_explicit_allow() local [all …]
|
| H A D | test-authz-pam.c | 79 QAuthZPAM *auth = qauthz_pam_new("auth0", in test_authz_unknown_service() local 83 g_assert_nonnull(auth); in test_authz_unknown_service() 85 g_assert_false(qauthz_is_allowed(QAUTHZ(auth), "fred", &local_err)); in test_authz_unknown_service() 88 object_unparent(OBJECT(auth)); in test_authz_unknown_service() 94 QAuthZPAM *auth = qauthz_pam_new("auth0", in test_authz_good_user() local 98 g_assert_nonnull(auth); in test_authz_good_user() 100 g_assert_true(qauthz_is_allowed(QAUTHZ(auth), "fred", &error_abort)); in test_authz_good_user() 102 object_unparent(OBJECT(auth)); in test_authz_good_user() 109 QAuthZPAM *auth = qauthz_pam_new("auth0", in test_authz_bad_user() local 113 g_assert_nonnull(auth); in test_authz_bad_user() [all …]
|
| /openbmc/openbmc/meta-security/meta-tpm/recipes-tpm1/openssl-tpm-engine/files/ |
| H A D | 0002-libtpm-support-env-TPM_SRK_PW.patch | 30 BYTE *auth; 42 - if (!tpm_engine_get_auth(ui, (char *)auth, 128, "SRK authorization: ", 45 - free(auth); 51 + memset(auth, 0, TPM_WELL_KNOWN_KEY_LEN); 56 + memset(auth, 0, authbuflen); 57 + strncpy(auth, srkPasswd, authbuflen-1); 59 + authlen = strlen(auth); 63 + if (!tpm_engine_get_auth(ui, (char *)auth, 128, 66 + free(auth); 71 + authlen = strlen(auth); [all …]
|
| /openbmc/openbmc/poky/meta/recipes-extended/cronie/cronie/ |
| H A D | crond_pam_config.patch | 6 password-auth is the Fedora's common pam configure file, use oe common pam 23 # Although no PAM authentication is called, auth modules 25 -auth include system-auth 26 +auth include common-auth 28 -account include system-auth 29 +account include common-auth 31 -session include system-auth
|
| /openbmc/openbmc/poky/meta/recipes-extended/shadow/files/ |
| H A D | shadow-update-pam-conf.patch | 6 The system-auth in the configure files is from Fedora which put all the 4 pam type rules 8 In yocto it obey the way with Debian/Ubuntu, and the names are common-auth, common-account, 34 auth sufficient pam_rootok.so 36 -password include system-auth 44 auth sufficient pam_rootok.so 46 -password include system-auth 54 auth sufficient pam_rootok.so 56 -password include system-auth 64 auth sufficient pam_rootok.so 66 -password include system-auth [all …]
|
| /openbmc/openbmc/meta-ibm/recipes-extended/pam/libpam/pam.d/ |
| H A D | common-auth | 2 # /etc/pam.d/common-auth - authentication settings common to all services 13 auth [default=1 success=ignore] pam_succeed_if.so quiet uid > 0 14 auth required pam_google_authenticator.so nullok 16 auth [success=3 default=ignore] pam_unix.so quiet 17 -auth [success=2 default=ignore] pam_ldap.so ignore_unknown_user ignore_authinfo_unavail 20 auth [default=die] pam_faillock.so authfail 21 auth requisite pam_deny.so 24 auth required pam_faillock.so authsucc
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/vlock/vlock-2.2.3/ |
| H A D | vlock_pam_tally2_reset.patch | 12 src/auth-pam.c | 3 +++ 15 diff --git a/src/auth-pam.c b/src/auth-pam.c 17 --- a/src/auth-pam.c 18 +++ b/src/auth-pam.c 19 @@ -148,6 +148,9 @@ bool auth(const char *user, struct timespec *timeout)
|
| H A D | vlock_pam | 1 # Use the default auth and account policies for vlock 2 auth include common-auth
|
| /openbmc/qemu/ui/ |
| H A D | vnc-auth-sasl.c | 177 trace_vnc_auth_fail(vs, vs->auth, "Cannot fetch SASL username", in vnc_auth_sasl_check_access() 182 trace_vnc_auth_fail(vs, vs->auth, "No SASL username set", ""); in vnc_auth_sasl_check_access() 197 trace_vnc_auth_fail(vs, vs->auth, "Error from authz", in vnc_auth_sasl_check_access() 267 trace_vnc_auth_fail(vs, vs->auth, "Malformed SASL client data", in protocol_client_auth_sasl_step() 284 trace_vnc_auth_fail(vs, vs->auth, "Cannot step SASL auth", in protocol_client_auth_sasl_step() 292 trace_vnc_auth_fail(vs, vs->auth, "SASL data too long", ""); in protocol_client_auth_sasl_step() 314 trace_vnc_auth_fail(vs, vs->auth, "SASL SSF too weak", ""); in protocol_client_auth_sasl_step() 323 trace_vnc_auth_pass(vs, vs->auth); in protocol_client_auth_sasl_step() 354 trace_vnc_auth_fail(vs, vs->auth, "SASL step len too large", ""); in protocol_client_auth_sasl_step_len() 395 trace_vnc_auth_fail(vs, vs->auth, "Malformed SASL client data", in protocol_client_auth_sasl_start() [all …]
|
| H A D | vnc-auth-vencrypt.c | 55 trace_vnc_auth_fail(vs, vs->auth, "Unhandled VeNCrypt subauth", ""); in start_auth_vencrypt_subauth() 73 trace_vnc_auth_fail(vs, vs->auth, "TLS handshake failed", in vnc_tls_handshake_done() 91 int auth = read_u32(data, 0); in protocol_client_vencrypt_auth() local 93 trace_vnc_auth_vencrypt_subauth(vs, auth); in protocol_client_vencrypt_auth() 94 if (auth != vs->subauth) { in protocol_client_vencrypt_auth() 95 trace_vnc_auth_fail(vs, vs->auth, "Unsupported sub-auth version", ""); in protocol_client_vencrypt_auth() 116 trace_vnc_auth_fail(vs, vs->auth, "TLS setup failed", in protocol_client_vencrypt_auth() 143 trace_vnc_auth_fail(vs, vs->auth, "Unsupported version", ""); in protocol_client_vencrypt_init()
|
| /openbmc/bmcweb/config/ |
| H A D | pam-webserver | 3 auth include common-auth 5 auth [success=ok perm_denied=1 default=ignore] pam_localuser.so 6 auth required pam_succeed_if.so user ingroup redfish
|
| H A D | meson.build | 6 'basic-auth', 7 'cookie-auth', 17 'insecure-disable-auth', 24 'mutual-tls-auth', 41 'session-auth', 45 'xtoken-auth', 136 'HTTP_AUTH_LEVEL': 'auth', 145 auths = get_option('additional-auth') 149 auth = 'auth' 155 auth = auths[index] [all …]
|
| /openbmc/qemu/authz/ |
| H A D | list.c | 150 ssize_t qauthz_list_append_rule(QAuthZList *auth, in qauthz_list_append_rule() argument 169 rules = auth->rules; in qauthz_list_append_rule() 178 auth->rules = tmp; in qauthz_list_append_rule() 184 ssize_t qauthz_list_insert_rule(QAuthZList *auth, in qauthz_list_insert_rule() argument 204 rules = auth->rules; in qauthz_list_insert_rule() 214 tmp->next = auth->rules; in qauthz_list_insert_rule() 215 auth->rules = tmp; in qauthz_list_insert_rule() 221 ssize_t qauthz_list_delete_rule(QAuthZList *auth, const char *match) in qauthz_list_delete_rule() argument 228 rules = auth->rules; in qauthz_list_delete_rule() 235 auth->rules = rules->next; in qauthz_list_delete_rule()
|
| /openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/ |
| H A D | common-auth | 2 # /etc/pam.d/common-auth - authentication settings common to all services 12 auth [success=2 default=ignore] pam_unix.so quiet 13 -auth [success=1 default=ignore] pam_ldap.so ignore_unknown_user ignore_authinfo_unavail 16 auth [default=die] pam_faillock.so authfail 19 auth sufficient pam_faillock.so authsucc 21 auth requisite pam_deny.so 25 auth required pam_permit.so
|
| /openbmc/openbmc/poky/meta/recipes-support/curl/ |
| H A D | curl_8.12.1.bb | 31 COMMON_PACKAGECONFIG = "basic-auth bearer-auth digest-auth ipfs negotiate-auth openssl proxy thread… 39 PACKAGECONFIG[basic-auth] = "--enable-basic-auth,--disable-basic-auth" 40 PACKAGECONFIG[bearer-auth] = "--enable-bearer-auth,--disable-bearer-auth" 46 PACKAGECONFIG[digest-auth] = "--enable-digest-auth,--disable-digest-auth" 52 PACKAGECONFIG[kerberos-auth] = "--enable-kerberos-auth,--disable-kerberos-auth" 61 PACKAGECONFIG[negotiate-auth] = "--enable-negotiate-auth,--disable-negotiate-auth"
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/ |
| H A D | lxdm-pam | 4 auth requisite pam_nologin.so 5 auth required pam_env.so 6 auth required pam_unix.so 8 #auth required pam_unix.so nullok
|
| H A D | lxdm-pam-debug | 4 auth requisite pam_nologin.so 5 auth required pam_env.so 6 #auth required pam_unix.so 8 auth required pam_unix.so nullok
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/rsyslog/rsyslog/ |
| H A D | rsyslog.conf | 23 auth,authpriv.* /var/log/auth.log 24 *.*;auth,authpriv.none -/var/log/syslog 50 auth,authpriv.none;\ 53 auth,authpriv.none;\
|
| /openbmc/openbmc-test-automation/tools/ |
| H A D | github_issues_to_csv | 14 auth = None variable 93 response = requests.get(pages["next"], auth=auth) 126 auth = (username, password) variable 152 response = requests.get(l_url, auth=auth)
|
| /openbmc/openbmc/poky/meta/recipes-extended/shadow/files/pam.d/ |
| H A D | chsh | 8 auth required pam_shells.so 12 auth sufficient pam_rootok.so 17 auth include common-auth
|
| H A D | chfn | 7 auth sufficient pam_rootok.so 12 auth include common-auth
|
| /openbmc/openbmc/poky/meta/recipes-extended/at/at/ |
| H A D | pam.conf.patch | 24 -@include common-auth 26 +auth include common-auth 32 auth required pam_env.so user_readenv=1
|
| /openbmc/qemu/include/authz/ |
| H A D | list.h | 77 ssize_t qauthz_list_append_rule(QAuthZList *auth, 83 ssize_t qauthz_list_insert_rule(QAuthZList *auth, 90 ssize_t qauthz_list_delete_rule(QAuthZList *auth,
|
| /openbmc/openbmc/meta-openembedded/meta-networking/recipes-protocols/frr/frr/ |
| H A D | frr.pam | 7 auth sufficient pam_rootok.so 13 auth include common-auth
|