| /openbmc/u-boot/doc/imx/habv4/csf_examples/mx6_mx7/ |
| H A D | csf_uboot.txt | 15 # Key used to authenticate the CSF data 21 # Key slot index used to authenticate the key to be installed 29 # Key slot index used to authenticate the image data
|
| H A D | csf_uboot_fast_authentication.txt | 20 # Key slot index 0 used to authenticate the image data
|
| /openbmc/u-boot/doc/imx/habv4/csf_examples/additional_images/ |
| H A D | csf_additional_images.txt | 15 # Key used to authenticate the CSF data 21 # Key slot index used to authenticate the key to be installed 29 # Key slot index used to authenticate the image data
|
| /openbmc/openbmc/meta-phosphor/recipes-phosphor/ipmi/ |
| H A D | phosphor-ipmi-net_git.bb | 36 PACKAGECONFIG ??= "pam-authenticate rmcp-ping" 38 PACKAGECONFIG[pam-authenticate] = "-Dpam_authenticate=enabled,-Dpam_authenticate=disabled"
|
| /openbmc/openbmc/meta-openembedded/meta-gnome/recipes-extended/polkit-gnome/polkit-gnome/ |
| H A D | 0001-Select-the-current-user-to-authenticate-with-by-defa.patch | 4 Subject: Select the current user to authenticate with by default 67 + /* Disable password entry and authenticate until have a user selected */
|
| /openbmc/openbmc/meta-openembedded/meta-networking/recipes-protocols/pptp-linux/pptp-linux/ |
| H A D | options.pptp | 7 # We don't need the tunnel server to authenticate itself
|
| /openbmc/openbmc/meta-openembedded/meta-gnome/recipes-extended/polkit-gnome/ |
| H A D | polkit-gnome_0.105.bb | 14 file://0001-Select-the-current-user-to-authenticate-with-by-defa.patch \
|
| /openbmc/openbmc/poky/meta/recipes-connectivity/ppp/ppp/ |
| H A D | provider | 33 # Do not ask the remote to authenticate.
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/mosh/ |
| H A D | mosh_1.4.0.bb | 36 # mosh uses SSH to authenticate and the client uses OpenSSH-specific features
|
| /openbmc/u-boot/doc/imx/habv4/guides/ |
| H A D | mx6_mx7_spl_secure_boot.txt | 19 final images, SPL and U-Boot proper. The HABv4 can be used to authenticate 101 to authenticate, which keys to install, use and etc.
|
| H A D | mx6_mx7_secure_boot.txt | 76 to authenticate, which keys to install, use and etc. 106 (3) Start of area in RAM to authenticate. 311 The U-Boot supports this feature and can be used to authenticate the Linux
|
| /openbmc/openbmc-test-automation/docs/ |
| H A D | redfish_request_via_mTLS.md | 69 not need to use mTLS to authenticate login and logout. It can be replaced as
|
| /openbmc/docs/architecture/ |
| H A D | user-management.md | 16 3. Have applications use the PAM module to authenticate the user instead of 330 Applications must use `pam_authenticate()` API to authenticate user. Stacked PAM 410 |authenticate the user | 443 authenticate against an LDAP directory. IPMI interface cannot be used to 444 authenticate against LDAP, since IPMI needs the password in clear text at the
|
| /openbmc/bmcweb/include/ |
| H A D | authentication.hpp | 255 inline std::shared_ptr<persistent_data::UserSession> authenticate( in authenticate() function
|
| /openbmc/openbmc/poky/meta/recipes-connectivity/ppp/ |
| H A D | ppp_2.5.2.bb | 76 SUMMARY:${PN}-winbind = "Plugin for PPP to authenticate against Samba or Windows"
|
| /openbmc/docs/designs/management-console/ |
| H A D | VMI_Certificate_Exchange.md | 198 | pldm |pldm call to authenticate 211 sends Verify Password command to authenticate user to establish secure
|
| /openbmc/qemu/tests/qemu-iotests/ |
| H A D | 207.out | 102 Job failed: failed to authenticate using publickey authentication and the identities held by your s…
|
| /openbmc/u-boot/doc/imx/habv4/ |
| H A D | introduction_habv4.txt | 11 to authenticate and/or decrypt the program image by using cryptography 194 Starting in HAB v4.1.2 users can use a single SRK key to authenticate the both
|
| /openbmc/openbmc/poky/bitbake/lib/toaster/toastergui/ |
| H A D | views.py | 1369 from django.contrib.auth import authenticate, login 1414 … user = authenticate(username = request.POST.get('username', '_anonuser'), password = 'nopass') 1418 user = authenticate(username = user.username, password = 'nopass') 1492 … user = authenticate(username = request.POST.get('username', '_anonuser'), password = 'nopass') 1496 user = authenticate(username = user.username, password = 'nopass')
|
| /openbmc/qemu/block/ |
| H A D | ssh.c | 488 static int authenticate(BDRVSSHState *s, Error **errp) in authenticate() function 774 ret = authenticate(s, errp); in connect_to_ssh()
|
| /openbmc/qemu/docs/system/ |
| H A D | tls.rst | 271 authenticate clients. For example, the VNC server can use SASL to 272 authenticate clients instead.
|
| H A D | vnc-security.rst | 82 Certificates can also provide a means to authenticate the client
|
| /openbmc/docs/designs/ |
| H A D | redfish-tls-user-authentication.md | 12 to authenticate using quite a few methods, eg. BasicAuth, Sessions, etc. In
|
| /openbmc/bmcweb/http/ |
| H A D | http2_connection.hpp | 324 thisReq.session = authentication::authenticate( in onRequestRecv()
|
| H A D | http_connection.hpp | 635 userSession = authentication::authenticate( in afterReadHeaders()
|