Home
last modified time | relevance | path

Searched refs:cert_type (Results 1 – 11 of 11) sorted by relevance

/openbmc/openbmc-test-automation/lib/
H A Dcertificate_utils.robot64 [Arguments] ${cert_type}=Client
67 # cert_type Certificate type (e.g. "Client" or "CA").
69 ${certificate} ${stderr} ${rc}= Run Keyword If '${cert_type}' == 'Client'
177 [Arguments] ${cert_type}
180 # cert_type Certificate type (e.g. "Client" or "CA").
183 ... Run Keyword If '${cert_type}' == 'Client'
186 ... ELSE IF '${cert_type}' == 'CA'
203 [Arguments] ${cert_type} ${cert_format} ${expected_status}
206 # cert_type Certificate type (e.g. "Server" or "Client").
213 ${cert_id}= Run Keyword If '${cert_type}' == 'Client'
[all …]
/openbmc/openbmc-test-automation/redfish/dmtf_tools/
H A Dtest_redfishtool_certificate.robot109 # cert_type cert_format expected_status
204 …[Arguments] ${cert_type} ${key_pair_algorithm} ${key_bit_length} ${key_curv_id} ${expected_st…
207 # cert_type Certificate type ("Server" or "Client").
214 ... '${cert_type}' == 'Server' ${REDFISH_HTTPS_CERTIFICATE_URI}/
215 ... '${cert_type}' == 'Client' ${REDFISH_LDAP_CERTIFICATE_URI}/
248 [Arguments] ${cert_type} ${cert_format} ${expected_status} ${delete_cert}=${True}
252 # cert_type Certificate type (e.g. "Client" or "CA").
258 Run Keyword If '${cert_type}' == 'CA'
260 ... ELSE IF '${cert_type}' == 'Client'
261 ... Redfishtool Delete Certificate Via BMC CLI ${cert_type} ${delete_cert}
[all …]
/openbmc/openbmc-test-automation/redfish/managers/
H A Dtest_certificate.robot30 # cert_type cert_format expected_status
42 # cert_type cert_format expected_status
54 # cert_type cert_format expected_status
64 # cert_type cert_format expected_status
76 # cert_type cert_format expected_status
190 # cert_type cert_format expected_status
202 # cert_type cert_format expected_status
213 # cert_type cert_format expected_status
225 # cert_type cert_format expected_status
272 …[Arguments] ${cert_type} ${key_pair_algorithm} ${key_bit_length} ${key_curv_id} ${expected_st…
[all …]
H A Dtest_multiple_interfaces.robot172 # cert_type cert_format expected_status
288 [Arguments] ${cert_type} ${cert_format} ${expected_status} ${delete_cert}=${True}
292 # cert_type Certificate type (e.g. "Client" or "CA").
302 Run Keyword If '${cert_type}' == 'CA' and '${delete_cert}' == '${True}'
304 ... ELSE IF '${cert_type}' == 'Client' and '${delete_cert}' == '${True}'
305 ... Delete Certificate Via BMC CLI ${cert_type}
312 ... '${cert_type}' == 'Client' ${REDFISH_LDAP_CERTIFICATE_URI}
313 ... '${cert_type}' == 'CA' ${REDFISH_CA_CERTIFICATE_URI}
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/
H A Dtest_certificates_sub_menu.robot129 [Arguments] ${cert_type}
132 # cert_type Certificate type (e.g. "Client" or "CA").
134 ${cert_file_path}= Run Keyword If '${cert_type}' == 'Client' or 'Server'
136 ... ELSE IF '${cert_type}' == 'CA'
/openbmc/linux/crypto/asymmetric_keys/
H A Dverify_pefile.c136 wrapper.length, wrapper.revision, wrapper.cert_type); in pefile_strip_sig_wrapper()
153 if (wrapper.cert_type != WIN_CERT_TYPE_PKCS_SIGNED_DATA) { in pefile_strip_sig_wrapper()
/openbmc/phosphor-rest-server/module/obmc/wsgi/apps/
H A Drest_dbus.py889 def __init__(self, route_handler, cert_type, service): argument
892 if not cert_type:
895 certPath = self.CERT_PATH + "/" + cert_type + "/" + service
949 def do_put(self, cert_type, service): argument
950 return CertificateHandler(self, cert_type, service).do_upload()
952 def do_delete(self, cert_type, service): argument
953 return CertificateHandler(self, cert_type, service).do_delete()
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-m/files/corstone1000/
H A D0001-Platform-Corstone1000-Align-capsule-UEFI-structs.patch86 struct efi_guid cert_type;
/openbmc/linux/include/linux/
H A Dpe.h477 uint16_t cert_type; member
H A Defi.h184 u16 cert_type; member
190 efi_guid_t cert_type; member
/openbmc/openbmc-test-automation/openpower/ext_interfaces/
H A Dtest_vmicert_management.robot631 # cert_type Type of the certificate requesting. eg. root or SignCSR.
696 # cert_type Type of the certificate requesting. eg. root or SignCSR.