| /qemu/tests/unit/ |
| A D | test-authz-list.c | 28 QAuthZList *auth = qauthz_list_new("auth0", in test_authz_default_deny() local 34 object_unparent(OBJECT(auth)); in test_authz_default_deny() 39 QAuthZList *auth = qauthz_list_new("auth0", in test_authz_default_allow() local 45 object_unparent(OBJECT(auth)); in test_authz_default_allow() 50 QAuthZList *auth = qauthz_list_new("auth0", in test_authz_explicit_deny() local 59 object_unparent(OBJECT(auth)); in test_authz_explicit_deny() 64 QAuthZList *auth = qauthz_list_new("auth0", in test_authz_explicit_allow() local 73 object_unparent(OBJECT(auth)); in test_authz_explicit_allow() 79 QAuthZList *auth = qauthz_list_new("auth0", in test_authz_complex() local 97 object_unparent(OBJECT(auth)); in test_authz_complex() [all …]
|
| A D | test-authz-listfile.c | 53 QAuthZListFile *auth = qauthz_list_file_new("auth0", in test_authz_default_deny() local 61 object_unparent(OBJECT(auth)); in test_authz_default_deny() 71 QAuthZListFile *auth = qauthz_list_file_new("auth0", in test_authz_default_allow() local 77 g_assert(qauthz_is_allowed(QAUTHZ(auth), "fred", &error_abort)); in test_authz_default_allow() 79 object_unparent(OBJECT(auth)); in test_authz_default_allow() 93 QAuthZListFile *auth = qauthz_list_file_new("auth0", in test_authz_explicit_deny() local 102 object_unparent(OBJECT(auth)); in test_authz_explicit_deny() 116 QAuthZListFile *auth = qauthz_list_file_new("auth0", in test_authz_explicit_allow() local 125 object_unparent(OBJECT(auth)); in test_authz_explicit_allow() 150 QAuthZListFile *auth = qauthz_list_file_new("auth0", in test_authz_complex() local [all …]
|
| A D | test-authz-pam.c | 79 QAuthZPAM *auth = qauthz_pam_new("auth0", in test_authz_unknown_service() local 83 g_assert_nonnull(auth); in test_authz_unknown_service() 85 g_assert_false(qauthz_is_allowed(QAUTHZ(auth), "fred", &local_err)); in test_authz_unknown_service() 88 object_unparent(OBJECT(auth)); in test_authz_unknown_service() 94 QAuthZPAM *auth = qauthz_pam_new("auth0", in test_authz_good_user() local 98 g_assert_nonnull(auth); in test_authz_good_user() 102 object_unparent(OBJECT(auth)); in test_authz_good_user() 109 QAuthZPAM *auth = qauthz_pam_new("auth0", in test_authz_bad_user() local 113 g_assert_nonnull(auth); in test_authz_bad_user() 115 g_assert_false(qauthz_is_allowed(QAUTHZ(auth), "bob", &local_err)); in test_authz_bad_user() [all …]
|
| A D | test-io-channel-tls.c | 115 QAuthZList *auth; in test_io_channel_tls() local 163 auth = qauthz_list_new("channeltlsacl", in test_io_channel_tls() 168 qauthz_list_append_rule(auth, *wildcards, in test_io_channel_tls() 259 object_unparent(OBJECT(auth)); in test_io_channel_tls()
|
| A D | test-crypto-tlssession.c | 253 QAuthZList *auth; in test_crypto_tls_session_x509() local 309 auth = qauthz_list_new("tlssessionacl", in test_crypto_tls_session_x509() 314 qauthz_list_append_rule(auth, *wildcards, in test_crypto_tls_session_x509() 405 object_unparent(OBJECT(auth)); in test_crypto_tls_session_x509()
|
| /qemu/ui/ |
| A D | vnc-auth-sasl.c | 182 trace_vnc_auth_fail(vs, vs->auth, "No SASL username set", ""); in vnc_auth_sasl_check_access() 197 trace_vnc_auth_fail(vs, vs->auth, "Error from authz", in vnc_auth_sasl_check_access() 284 trace_vnc_auth_fail(vs, vs->auth, "Cannot step SASL auth", in protocol_client_auth_sasl_step() 292 trace_vnc_auth_fail(vs, vs->auth, "SASL data too long", ""); in protocol_client_auth_sasl_step() 323 trace_vnc_auth_pass(vs, vs->auth); in protocol_client_auth_sasl_step() 413 trace_vnc_auth_fail(vs, vs->auth, "Cannot start SASL auth", in protocol_client_auth_sasl_start() 420 trace_vnc_auth_fail(vs, vs->auth, "SASL data too long", ""); in protocol_client_auth_sasl_start() 451 trace_vnc_auth_pass(vs, vs->auth); in protocol_client_auth_sasl_start() 587 trace_vnc_auth_fail(vs, vs->auth, "Cannot format local IP", in start_auth_sasl() 620 if (vs->auth == VNC_AUTH_VENCRYPT && in start_auth_sasl() [all …]
|
| A D | vnc-auth-vencrypt.c | 55 trace_vnc_auth_fail(vs, vs->auth, "Unhandled VeNCrypt subauth", ""); in start_auth_vencrypt_subauth() 73 trace_vnc_auth_fail(vs, vs->auth, "TLS handshake failed", in vnc_tls_handshake_done() 91 int auth = read_u32(data, 0); in protocol_client_vencrypt_auth() local 93 trace_vnc_auth_vencrypt_subauth(vs, auth); in protocol_client_vencrypt_auth() 94 if (auth != vs->subauth) { in protocol_client_vencrypt_auth() 95 trace_vnc_auth_fail(vs, vs->auth, "Unsupported sub-auth version", ""); in protocol_client_vencrypt_auth() 116 trace_vnc_auth_fail(vs, vs->auth, "TLS setup failed", in protocol_client_vencrypt_auth() 143 trace_vnc_auth_fail(vs, vs->auth, "Unsupported version", ""); in protocol_client_vencrypt_init()
|
| A D | trace-events | 33 # vnc-auth-sasl.c 34 # vnc-auth-vencrypt.c 72 vnc_auth_init(void *display, int websock, int auth, int subauth) "VNC auth init state=%p websock=%d… 73 vnc_auth_start(void *state, int method) "VNC client auth start state=%p method=%d" 74 vnc_auth_pass(void *state, int method) "VNC client auth passed state=%p method=%d" 78 vnc_auth_vencrypt_subauth(void *state, int auth) "VNC client auth vencrypt subauth state=%p auth=%d" 79 vnc_auth_sasl_mech_list(void *state, const char *mechs) "VNC client auth SASL state=%p mechlist=%s" 80 vnc_auth_sasl_mech_choose(void *state, const char *mech) "VNC client auth SASL state=%p mech=%s" 83 vnc_auth_sasl_ssf(void *state, int ssf) "VNC client auth SASL SSF state=%p size=%d" 84 vnc_auth_sasl_username(void *state, const char *name) "VNC client auth SASL user state=%p name=%s" [all …]
|
| A D | vnc.c | 189 switch (vd->auth) { in vnc_auth_name() 468 qmp_query_auth(auth, subauth, &info->auth, in qmp_query_server_entry() 480 switch (auth) { in qmp_query_auth() 557 qmp_query_auth(vd->auth, vd->subauth, &info->auth, in qmp_query_vnc_servers() 2858 switch (vs->auth) { in protocol_client_auth() 3278 vs->auth = VNC_AUTH_NONE; in vnc_connect() 3285 vs->auth = vd->auth; in vnc_connect() 3446 vd->auth = VNC_AUTH_INVALID; in vnc_display_close() 3604 vnc_display_setup_auth(int *auth, in vnc_display_setup_auth() argument 3662 *auth = VNC_AUTH_VNC; in vnc_display_setup_auth() [all …]
|
| A D | spice-core.c | 46 static const char *auth = "spice"; variable 246 if (auth) { in channel_event() 247 server->auth = g_strdup(auth); in channel_event() 543 info->auth = g_strdup(auth); in qmp_query_spice_real() 760 auth = "sasl"; in qemu_spice_init() 763 auth = "none"; in qemu_spice_init() 914 if (strcmp(auth, "spice") != 0) { in qemu_spice_set_passwd()
|
| A D | ui-hmp-cmds.c | 115 VncPrimaryAuth auth, in hmp_info_vnc_authcrypt() argument 119 VncPrimaryAuth_str(auth), in hmp_info_vnc_authcrypt() 143 hmp_info_vnc_authcrypt(mon, " ", sinfo->auth, in hmp_info_vnc_servers() 175 hmp_info_vnc_authcrypt(mon, " ", info->auth, in hmp_info_vnc() 227 monitor_printf(mon, " auth: %s\n", info->auth); in hmp_info_spice()
|
| A D | meson.build | 42 'vnc-auth-vencrypt.c', 48 vnc_ss.add(when: sasl, if_true: files('vnc-auth-sasl.c'))
|
| A D | vnc.h | 173 int auth; member 294 int auth; member
|
| /qemu/authz/ |
| A D | list.c | 150 ssize_t qauthz_list_append_rule(QAuthZList *auth, in qauthz_list_append_rule() argument 169 rules = auth->rules; in qauthz_list_append_rule() 178 auth->rules = tmp; in qauthz_list_append_rule() 184 ssize_t qauthz_list_insert_rule(QAuthZList *auth, in qauthz_list_insert_rule() argument 204 rules = auth->rules; in qauthz_list_insert_rule() 214 tmp->next = auth->rules; in qauthz_list_insert_rule() 215 auth->rules = tmp; in qauthz_list_insert_rule() 221 ssize_t qauthz_list_delete_rule(QAuthZList *auth, const char *match) in qauthz_list_delete_rule() argument 228 rules = auth->rules; in qauthz_list_delete_rule() 235 auth->rules = rules->next; in qauthz_list_delete_rule()
|
| /qemu/include/authz/ |
| A D | list.h | 77 ssize_t qauthz_list_append_rule(QAuthZList *auth, 83 ssize_t qauthz_list_insert_rule(QAuthZList *auth, 90 ssize_t qauthz_list_delete_rule(QAuthZList *auth,
|
| /qemu/qapi/ |
| A D | ui.json | 230 # @auth: authentication method 236 'data': { '*auth': 'str' }, 302 # @auth: the current authentication type used by the server 503 'data': { '*auth': 'str' }, 555 # text auth 559 # text auth 562 # auth 610 # only specified in case auth == vencrypt. 616 'data': { 'auth' : 'VncPrimaryAuth', 639 # only specified in case auth == vencrypt. [all …]
|
| A D | qom.json | 1019 # @id-auth: 4096-byte, base64-encoded blob to provide the 'ID 1023 # @author-key-enabled: true if 'id-auth' blob contains the 'AUTHOR_KEY' 1045 '*id-auth': 'str',
|
| A D | block-core.json | 4273 # @auth-client-required: Acceptable authentication modes. This maps 4294 '*auth-client-required': ['RbdAuthMode'],
|
| /qemu/block/ |
| A D | rbd.c | 266 RbdAuthModeList *auth; in qemu_rbd_set_auth() local 283 for (auth = opts->auth_client_required; auth; auth = auth->next) { in qemu_rbd_set_auth() 287 g_string_append(accu, RbdAuthMode_str(auth->value)); in qemu_rbd_set_auth()
|
| A D | trace-events | 193 ssh_auth_methods(int methods) "auth methods=0x%x"
|
| /qemu/docs/system/i386/ |
| A D | amd-memory-encryption.rst | 214 | id-auth | string| none | base64 encoded authentication | 217 | author-key-enabled | bool | 0 | auth block contains author key |
|
| /qemu/scripts/ |
| A D | meson-buildoptions.sh | 243 --enable-auth-pam) printf "%s" -Dauth_pam=enabled ;; 244 --disable-auth-pam) printf "%s" -Dauth_pam=disabled ;;
|
| /qemu/docs/system/ |
| A D | vnc-security.rst | 172 username/password auth facility similar to DIGEST-MD5, but does not
|
| /qemu/tests/data/qobject/ |
| A D | qdict.txt | 1469 auth.c: 35 1476 auth.h: 540
|
| /qemu/ |
| A D | qemu-options.hx | 2268 locations for the service config. While some SASL auth methods 2498 will cause the VNC server socket to enable the VeNCrypt auth 2517 SASL auth methods can also provide data encryption (eg GSSAPI), 3822 ``tls-auth`` provides the ID of the QAuthZ authorization object
|