Home
last modified time | relevance | path

Searched refs:authentication (Results 1 – 25 of 231) sorted by relevance

12345678910

/openbmc/openbmc/meta-ibm/recipes-extended/pam/libpam/pam.d/
H A Dcommon-auth2 # /etc/pam.d/common-auth - authentication settings common to all services
5 # and should contain a list of the authentication modules that define
6 # the central authentication scheme for use on the system
8 # traditional Unix authentication mechanisms.
18 # Control gets here when no authentication module succeeds. Increment the
22 # Control gets here when authentication succeeds. Check if the user is locked
23 # out due to consecutive authentication failures and return status accordingly.
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/
H A Dcommon-auth2 # /etc/pam.d/common-auth - authentication settings common to all services
5 # and should contain a list of the authentication modules that define
6 # the central authentication scheme for use on the system
8 # traditional Unix authentication mechanisms.
14 # Control gets here when no authentication module succeeds. Increment the
17 # Control gets here when authentication succeeds. Check if the user is locked
18 # out due to consecutive authentication failures and return status accordingly.
/openbmc/qemu/docs/system/
H A Dvnc-security.rst16 authentication. For this setup it is recommended to restrict it to
33 The VNC protocol has limited support for password based authentication.
37 VNC server using password authentication should be restricted to only
39 authentication is not supported when operating in FIPS 140-2 compliance
40 mode as it requires the use of the DES cipher. Password authentication
59 authentication. The use of x509 certificates is strongly recommended,
62 authentication. This allows any client to connect, and provides an
101 authentication to provide two layers of authentication for clients.
114 With SASL authentication
117 The SASL authentication method is a VNC extension, that provides an
[all …]
/openbmc/bmcweb/
H A DREADME.md28 Bmcweb supports multiple authentication protocols:
30 - Basic authentication per RFC7617
31 - Cookie based authentication for authenticating against webui-vue
32 - Mutual TLS authentication based on OpenSSL
33 - Session authentication through webui-vue
34 - XToken based authentication conformant to Redfish DSP0266
36 Each of these types of authentication is able to be enabled or disabled both via
38 options. All authentication mechanisms supporting username/password are routed
39 to libpam, to allow for customization in authentication implementations.
/openbmc/linux/Documentation/ABI/testing/
H A Dsysfs-class-firmware-attributes149 What: /sys/class/firmware-attributes/*/authentication/
156 Devices support various authentication mechanisms which can be exposed
166 Change in any of these two authentication methods will also generate an
171 <attr> authentication is enabled.
175 The type of authentication used.
195 The means of authentication. This attribute is mandatory.
256 Available for HDD and NVMe authentication to set 'user' or 'master'
265 Used with HDD and NVME authentication to set the drive index
270 These attributes are used for certificate based authentication. This is
272 based authentication.
[all …]
/openbmc/linux/drivers/platform/x86/hp/hp-bioscfg/
H A Dspmobj-attributes.c42 size_t hp_calculate_security_buffer(const char *authentication) in hp_calculate_security_buffer() argument
46 if (!authentication) in hp_calculate_security_buffer()
49 authlen = strlen(authentication); in hp_calculate_security_buffer()
54 if (!strstarts(authentication, BEAM_PREFIX)) in hp_calculate_security_buffer()
69 int hp_populate_security_buffer(u16 *authbuf, const char *authentication) in hp_populate_security_buffer() argument
75 if (strstarts(authentication, BEAM_PREFIX)) { in hp_populate_security_buffer()
81 auth = hp_ascii_to_utf16_unicode(auth, authentication); in hp_populate_security_buffer()
93 authentication); in hp_populate_security_buffer()
/openbmc/openbmc/poky/meta/recipes-extended/pam/libpam/pam.d/
H A Dcommon-auth2 # /etc/pam.d/common-auth - authentication settings common to all services
5 # and should contain a list of the authentication modules that define
6 # the central authentication scheme for use on the system
8 # traditional Unix authentication mechanisms.
/openbmc/linux/drivers/platform/x86/dell/dell-wmi-sysman/
H A Dsysman.c76 size_t calculate_security_buffer(char *authentication) in calculate_security_buffer() argument
78 if (strlen(authentication) > 0) { in calculate_security_buffer()
79 return (sizeof(u32) * 2) + strlen(authentication) + in calculate_security_buffer()
80 strlen(authentication) % 2; in calculate_security_buffer()
92 void populate_security_buffer(char *buffer, char *authentication) in populate_security_buffer() argument
98 *sectype = strlen(authentication) > 0 ? 1 : 0; in populate_security_buffer()
99 *seclen = strlen(authentication); in populate_security_buffer()
102 if (strlen(authentication) > 0) in populate_security_buffer()
103 memcpy(auth, authentication, *seclen); in populate_security_buffer()
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/
H A D0017-Implement-Private-Authenticated-Variable-verificatio.patch6 Refactor the implementation to only use the PK, KEK, DB authentication
7 chain for boot variables, and implement the self authentication for
64 - /* Save the timestamp into a buffer, which can be overwritten by the authentication function */
65 …imestamp and fingerprints into a buffer, which can be overwritten by the authentication function */
119 -/* Basic verification of the authentication header of the new variable.
146 + * Basic verification of the authentication header of the new variable.
147 * First finds the key variable responsible for the authentication of the new variable,
162 - /* Run Secure Boot related authentication steps */
165 + /* Run Private Authenticated Variable related authentication steps */
168 + /* Run Secure Boot related authentication steps */
[all …]
H A D0016-Isolate-common-uefi-variable-authentication-steps.patch4 Subject: [PATCH 2/3] Isolate common uefi variable authentication steps
79 + * Time associated with the authentication descriptor. For the TimeStamp value,
115 + /* Run Secure Boot related authentication steps */
118 + /* Remove the authentication header from the variable if the authentication is successful */
154 * Platform Key is checked to enable or disable authentication.
168 /* If PK does not exist authentication is disabled */
192 - * Time associated with the authentication descriptor. For the TimeStamp value,
265 - /* Remove the authentication header from the variable if the authentication is successful */
/openbmc/linux/Documentation/arch/arm64/
H A Dpointer-authentication.rst2 Pointer authentication in AArch64 Linux
9 This document briefly describes the provision of pointer authentication
38 (APDAKey, APDBKey), and one for generic authentication (APGAKey).
49 Presence of address authentication functionality is advertised via
50 HWCAP_PACA, and generic authentication functionality via HWCAP_PACG.
57 with HINT space pointer authentication instructions protecting
59 with or without pointer authentication support.
72 authentication is present, the kernel will expose the position of TTBR0
91 Pointer authentication is enabled in KVM guest when each virtual cpu is
95 these userspace flags are checked before enabling pointer authentication.
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/
H A Dpam-radius_3.0.0.bb1 SUMMARY = "PAM module for RADIUS authentication"
3 authentication and accounting requests. You will need a RADIUS server to perform \
4 the actual authentication."
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/u-boot/corstone1000/
H A D0038-corstone1000-introduce-EFI-authenticated-capsule-upd.patch44 + log_err("Corstone1000: Capsule authentication flag check failed. Aborting update\n");
59 + log_err("Corstone1000: Capsule authentication check failed. Aborting update\n");
65 + log_debug("Corstone1000: Capsule authentication successful\n");
67 + log_debug("Corstone1000: Capsule authentication disabled. ");
/openbmc/openbmc-test-automation/openpower/
H A Dtest_inband_bmc_auth_reset.robot2 Documentation OEM IPMI in-band BMC authentication reset.
4 # This resets the BMC authentication:
19 [Documentation] Trigger in-band BMC authentication reset and verify.
/openbmc/openbmc-test-automation/docs/
H A Dredfish_request_via_mTLS.md3 When the BMC only enables mTLS type for authentication. Redfish request in robot
14 - **VALID_CERT** indicates valid mTLS certificate for authentication. When a
56 ## Test Cases for mTLS authentication
58 mTLS authentication is only a means to connect to the BMC, not for testing
60 mTLS authentication. (Requires test certificate with different privileges or
/openbmc/openbmc/poky/meta/recipes-connectivity/openssh/openssh/
H A Dsshd_config62 # Change to yes to enable keyboard-interactive authentication (beware issues
76 # Set this to 'yes' to enable PAM authentication, account processing,
77 # and session processing. If this is enabled, PAM authentication will
80 # PAM authentication via KbdInteractiveAuthentication may bypass
83 # PAM authentication, then enable this but set PasswordAuthentication
/openbmc/linux/drivers/target/iscsi/
H A Discsi_target_tpg.c90 tpg->tpg_attrib.authentication = 0; in iscsit_load_discovery_tpg()
212 a->authentication = TA_AUTHENTICATION; in iscsit_set_default_tpg_attribs()
323 if (tpg->tpg_attrib.authentication) { in iscsit_tpg_enable_portal_group()
585 int iscsit_ta_authentication(struct iscsi_portal_group *tpg, u32 authentication) in iscsit_ta_authentication() argument
592 if ((authentication != 1) && (authentication != 0)) { in iscsit_ta_authentication()
594 " %u, ignoring request.\n", authentication); in iscsit_ta_authentication()
605 if (authentication) { in iscsit_ta_authentication()
638 a->authentication = authentication; in iscsit_ta_authentication()
640 a->authentication ? "Enforcing" : "Disabling", tpg->tpgt); in iscsit_ta_authentication()
/openbmc/linux/Documentation/filesystems/
H A Dubifs-authentication.rst33 can be used to get full data authentication at the block layer.
37 authentication for UBIFS. Since UBIFS uses fscrypt for file contents and file
38 name encryption, the authentication system could be tied into fscrypt such that
40 be possible to use UBIFS authentication without using encryption.
209 This chapter introduces UBIFS authentication which enables UBIFS to verify
216 UBIFS authentication enables detection of offline data modification. While it
221 UBIFS authentication will not protect against rollback of full flash contents.
235 UBIFS authentication does not cover attacks where an attacker is able to
236 execute code on the device after the authentication key was provided.
327 it is necessary to also add authentication information frequently to the
[all …]
/openbmc/u-boot/board/xilinx/zynqmp/
H A DKconfig14 either authentication or encryption or both encryption
15 and authentication feature enabled while generating
/openbmc/openbmc/meta-openembedded/meta-python/recipes-extended/python-pykickstart/files/
H A D0001-support-authentication-for-kickstart.patch4 Subject: [PATCH] support authentication for kickstart
7 we support basic/digest authentication.
9 Add KickstartAuthError to report authentication failure,
29 + KickstartAuthError - An exception for errors relating to authentication
41 + """An exception for errors relating to authentication failed while
/openbmc/qemu/docs/system/arm/
H A Demulation.rst56 - FEAT_EPAC (Enhanced pointer authentication)
67 - FEAT_FPACCOMBINE (Faulting on combined pointer authentication instructions)
68 - FEAT_FPACC_SPEC (Speculative behavior of combined pointer authentication instructions)
102 - FEAT_PACIMP (Pointer authentication - IMPLEMENTATION DEFINED algorithm)
103 - FEAT_PACQARMA3 (Pointer authentication - QARMA3 algorithm)
104 - FEAT_PACQARMA5 (Pointer authentication - QARMA5 algorithm)
108 - FEAT_PAuth (Pointer authentication)
109 - FEAT_PAuth2 (Enhancements to pointer authentication)
/openbmc/qemu/qapi/
H A Dui.json230 # @auth: authentication method
302 # @auth: the current authentication type used by the server
304 # - 'none' if no authentication is being used
305 # - 'spice' uses SASL or direct TLS authentication, depending on
398 # Emitted after initial handshake and authentication takes place (if
496 # @auth: authentication method used for the plain (non-websocket) VNC
511 # @x509_dname: If x509 authentication is in use, the Distinguished
514 # @sasl_username: If SASL authentication is in use, the SASL username
515 # used for authentication.
544 # @auth: the current authentication type used by the server
[all …]
/openbmc/qemu/
H A Dqemu.sasl3 # as authentication.
6 # you like for authentication, because TLS provides the encryption
22 # 'scram-sha-256' plugin allows plain username/password authentication
/openbmc/openbmc/meta-security/dynamic-layers/meta-python/recipes-security/mfa/
H A Dpython3-privacyidea_3.9.1.bb1 SUMMARY = "identity, multifactor authentication (OTP), authorization, audit"
2authentication like OTP tokens, SMS, smartphones or SSH keys. Using privacyIDEA you can enhance yo…
/openbmc/u-boot/board/xilinx/zynq/
H A DKconfig29 either authentication or encryption or both encryption
30 and authentication feature enabled while generating

12345678910