Home
last modified time | relevance | path

Searched full:credentials (Results 1 – 25 of 223) sorted by relevance

123456789

/openbmc/linux/Documentation/security/
H A Dcredentials.rst2 Credentials in Linux
29 credentials. What's in the set depends on the type of object.
33 Amongst the credentials of most objects, there will be a subset that
42 Also amongst the credentials of those objects, there will be a subset that
65 A subject has an additional interpretation of its credentials. A subset
66 of its credentials forms the 'subjective context'. The subjective context
117 of its credentials. When an action is requested, they take the
122 Types of Credentials
125 The Linux kernel supports the following types of credentials:
127 1. Traditional UNIX credentials.
[all …]
/openbmc/linux/kernel/
H A Dcred.c2 /* Task credentials management - see Documentation/security/credentials.rst
42 * The initial credentials for the initial task
66 * The RCU callback to actually dispose of a set of credentials
93 * __put_cred - Destroy a set of credentials
96 * Destroy a set of credentials on which no references remain.
115 * Clean up a task's credentials when it exits
139 * get_task_cred - Get another task's objective credentials
142 * Get the objective credentials of a task, pinning them so that they can't go
143 * away. Accessing a task's credentials directly is not permitted.
165 * Allocate blank credentials, such that the credentials can be filled in at a
[all …]
/openbmc/linux/include/linux/
H A Dcred.h2 /* Credentials management - see Documentation/security/credentials.rst
37 * If the caller is accessing a task's credentials, they must hold the RCU read
175 * get_new_cred - Get a reference on a new set of credentials
176 * @cred: The new credentials to reference
178 * Get a reference on the specified set of new credentials. The caller must
188 * get_cred - Get a reference on a set of credentials
189 * @cred: The credentials to reference
191 * Get a reference on the specified set of credentials. The caller must
194 * This is used to deal with a committed set of credentials. Although the
197 * accidental alteration of a set of credentials that should be considered
[all …]
/openbmc/qemu/include/crypto/
H A Dtlscreds.h42 * types of TLS handshake credentials. Most commonly the
44 * certificate credentials.
54 * @creds: pointer to a TLS credentials object
55 * @endpoint: type of network endpoint that will be using the credentials
58 * Check whether the credentials is setup according to
61 * Returns true if the credentials is setup for the endpoint, false otherwise
H A Dtlssession.h114 * @creds: pointer to a TLS credentials object
116 * @aclname: optional ACL to validate peer credentials against
128 * the server's credentials (aka x509 certificate).
132 * the peer's credentials. For x509 credentials, the ACL
171 * Validate the peer's credentials after a successful
176 * Returns 0 if the credentials validated, -1 on error
345 * credentials, this will return the CommonName from
/openbmc/openbmc-tools/reboot-ping-pong/
H A Drpp10 Credentials = namedtuple("Credentials", "username, password") variable
11 Target = namedtuple("Target", "credentials, endpoint")
88 self.entity.console.credentials.username.encode()
92 self.entity.console.credentials.password.encode()
136 self.entity.console.credentials.username,
143 self.entity.console.credentials.password.encode()
181 bmccreds = Credentials("root", "0penBmc")
189 Credentials("user", "password"), Endpoint("host.somewhere.com", 22)
/openbmc/qemu/include/io/
H A Dchannel-tls.h57 * @creds: the credentials to use for TLS handshake
63 * credentials provided in @creds. If the @aclname parameter
65 * credentials (ie a x509 client certificate) which will
87 * @creds: the credentials to use for TLS handshake
93 * credentials provided in @creds. The @hostname parameter
95 * and will be validated against the server's credentials
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-requests-toolbelt/
H A D720240501dca0b4eacc3295665d7ced8719e11d2.patch53 - "Access-Control-Allow-Credentials": "true",
61 + "Access-Control-Allow-Credentials": [
123 - "Access-Control-Allow-Credentials": "true",
131 + "Access-Control-Allow-Credentials": [
193 - "Access-Control-Allow-Credentials": "true",
201 + "Access-Control-Allow-Credentials": [
263 - "Access-Control-Allow-Credentials": "true",
271 + "Access-Control-Allow-Credentials": [
333 - "Access-Control-Allow-Credentials": "true",
341 + "Access-Control-Allow-Credentials": [
[all …]
/openbmc/qemu/docs/system/
H A Dtls.rst245 QEMU has a standard mechanism for loading x509 credentials that will be
248 for the system emulators. Each set of credentials loaded should be given
250 credentials can be used for multiple network backends, so VNC,
251 migration, NBD, character devices can all share the same credentials.
252 Note, however, that credentials for use in a client endpoint must be
263 dynamically generate DH parameters when loading the credentials.
265 The ``endpoint`` parameter indicates whether the credentials will be
279 To load server credentials with client certificate validation enabled
285 while to load client credentials use
292 parameter which expects the ID of the TLS credentials object. For
/openbmc/openbmc-test-automation/security/
H A Dtest_bmc_connections.robot147 # Every 100th iteration Login with correct credentials
175 Run Keyword And Ignore Error Login to GUI With Incorrect Credentials
221 Test BMCweb Stability On Continuous Redfish Login Attempts With Invalid Credentials
222 [Documentation] Make invalid credentials Redfish login attempts continuously and
223 ... verify bmcweb stability by login to Redfish with valid credentials.
226 Invalid Credentials Redfish Login Attempts
340 Login to GUI With Incorrect Credentials
348 Invalid Credentials Redfish Login Attempts
349 [Documentation] Continuous invalid credentials login attempts to Redfish and
350 ... login to Redfish with valid credentials at times and get failed login attempts.
[all …]
/openbmc/qemu/crypto/
H A Dtlscredspsk.c101 error_setg(errp, "Cannot allocate credentials: %s", in qcrypto_tls_creds_psk_load()
114 error_setg(errp, "Cannot set PSK server credentials: %s", in qcrypto_tls_creds_psk_load()
138 error_setg(errp, "Cannot allocate credentials: %s", in qcrypto_tls_creds_psk_load()
146 error_setg(errp, "Cannot set PSK client credentials: %s", in qcrypto_tls_creds_psk_load()
186 error_setg(errp, "TLS credentials support requires GNUTLS"); in qcrypto_tls_creds_psk_load()
H A Dtlscredsanon.c54 error_setg(errp, "Cannot allocate credentials: %s", in qcrypto_tls_creds_anon_load()
70 error_setg(errp, "Cannot allocate credentials: %s", in qcrypto_tls_creds_anon_load()
107 error_setg(errp, "TLS credentials support requires GNUTLS"); in qcrypto_tls_creds_anon_load()
H A Dtlssession.c157 error_setg(errp, "Credentials endpoint doesn't match session"); in qcrypto_tls_session_new()
204 error_setg(errp, "Cannot set session credentials: %s", in qcrypto_tls_session_new()
240 error_setg(errp, "Cannot set session credentials: %s", in qcrypto_tls_session_new()
262 error_setg(errp, "Cannot set session credentials: %s", in qcrypto_tls_session_new()
274 error_setg(errp, "Unsupported TLS credentials type %s", in qcrypto_tls_session_new()
/openbmc/docs/designs/
H A Dexpired-password.md26 1. Success, when the access credentials (such as username and password) are
28 2. Failure, when either the access credentials are invalid or the account being
31 3. PasswordChangeRequired, when the access credentials are correct and the
54 credentials, whether or not those credentials have expired and must be
103 credentials are otherwise correct and the reason for the authentication
109 The `/login` URI is enhanced. If it is used with correct credentials (userid
H A Dcertificate-revocation-list.md36 Instead, Google has a dedicated daemon for credentials installation, and this
72 to reload newly installed credentials.
/openbmc/openbmc-test-automation/openpower/
H A Dtest_inband_bmc_auth_reset.robot24 @{credentials}= Create List ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD}
25 ${data}= create dictionary data=@{credentials}
/openbmc/linux/include/linux/soc/ti/
H A Dk3-ringacc.h28 * @K3_RINGACC_RING_MODE_CREDENTIALS: Credentials mode is message mode plus
29 * stores credentials with each message, requiring the element size to be
30 * doubled to fit the credentials. Any exposed memory should be protected
109 * Message/Credentials/Queue mode.
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/
H A DHostInterface.v1_3_3.json179 …ecated": "This property has been deprecated in favor of newer methods of negotiating credentials.",
190 …ecated": "This property has been deprecated in favor of newer methods of negotiating credentials.",
230 …ecated": "This property has been deprecated in favor of newer methods of negotiating credentials.",
241 …ecated": "This property has been deprecated in favor of newer methods of negotiating credentials.",
344 …ecated": "This property has been deprecated in favor of newer methods of negotiating credentials.",
352 …ecated": "This property has been deprecated in favor of newer methods of negotiating credentials.",
/openbmc/openbmc-test-automation/extended/
H A Dtest_bmc_stress_buster.robot62 @{credentials}= Create List ${rest_username} ${rest_password}
63 ${data}= Create Dictionary data=@{credentials}
/openbmc/linux/net/sunrpc/
H A Dauth_unix.c77 * Match credentials against current the auth_cred.
107 * Marshal credentials.
163 * Refresh credentials. This is a no-op for AUTH_UNIX
/openbmc/openbmc-test-automation/redfish/service_root/
H A Dtest_sessions_management.robot26 Create Session And Verify Response Code Using Different Credentials
27 [Documentation] Create session and verify response code using different credentials.
39 Create Session And Verify Response Code Using Operator Credentials
40 [Documentation] Create session and verify response code using operator credentials.
/openbmc/linux/security/
H A Dsecurity.c792 * @mgr: task credentials of current binder process
908 * @new: new credentials for the target process
909 * @old: current credentials of the target process
930 * @cred: credentials to examine
936 * credentials. @cap contains the capability <include/linux/capability.h>.
1045 * security_bprm_creds_for_exec() - Prepare the credentials for exec()
1071 * ensures that the credentials will not be derived from a script that the
1114 * transformed by an execve operation, based on the old credentials pointed to
1131 * being transformed by an execve operation. The new credentials have, by this
2914 * @cred: credentials
[all …]
H A Dcommoncap.c53 * @cred: The credentials to use
232 * @new: The proposed new credentials; alterations should be made here
233 * @old: The current task's current credentials
240 * credentials, and assuming no error, will be committed by the caller of LSM.
720 * its xattrs and, if present, apply them to the proposed credentials being
875 * cap_bprm_creds_from_file - Set up the proposed credentials for execve().
877 * @file: The file to pull the credentials from
879 * Set up the proposed credentials for a new execution context being
910 * credentials unless they have the appropriate permit. in cap_bprm_creds_from_file()
1114 * @new: The proposed credentials
[all …]
/openbmc/qemu/qapi/
H A Dcrypto.json12 # The type of network endpoint that will be using the credentials.
479 # @verify-peer: if true the peer credentials will be verified once the
481 # credentials. (default: true)
486 # credentials will be acting as a client or as a server
532 # credentials (default: true)
/openbmc/qemu/migration/
H A Dtls.c40 error_setg(errp, "No TLS credentials with id '%s'", tls_creds); in migration_tls_get_creds()
46 error_setg(errp, "Object with id '%s' is not TLS credentials", in migration_tls_get_creds()

123456789