/qemu/crypto/ |
H A D | tlscredspsk.c | 35 lookup_key(const char *pskfile, const char *username, gnutls_datum_t *key, in lookup_key() argument 38 const size_t ulen = strlen(username); in lookup_key() 62 username, pskfile); in lookup_key() 76 const char *username; in qcrypto_tls_creds_psk_load() local 85 if (creds->username) { in qcrypto_tls_creds_psk_load() 127 if (creds->username) { in qcrypto_tls_creds_psk_load() 128 username = creds->username; in qcrypto_tls_creds_psk_load() 130 username = "qemu"; in qcrypto_tls_creds_psk_load() 132 if (lookup_key(pskfile, username, &key, errp) != 0) { in qcrypto_tls_creds_psk_load() 255 creds->username = g_strdup(value); in qcrypto_tls_creds_psk_prop_set_username() [all …]
|
H A D | tlscredspriv.h | 53 char *username; member
|
/qemu/qga/ |
H A D | commands-windows-ssh.c | 47 g_free(info->username); in free_userInfo() 104 static char *get_ssh_folder(const char *username, const bool isAdmin, in get_ssh_folder() argument 124 return g_build_filename(profilesDir, username, ".ssh", NULL); in get_ssh_folder() 148 userInfo->username); in create_acl_user() 176 userInfo->username, setResult); in create_acl_user() 391 userInfo->username); in set_file_permissions() 489 error_setg(errp, "User %s was not found", username); in get_user_info() 501 uData->username = g_strdup(username); in get_user_info() 563 if (!get_user_info(&userInfo, username, errp)) { in qmp_guest_ssh_get_authorized_keys() 617 if (!get_user_info(&userInfo, username, errp)) { in qmp_guest_ssh_add_authorized_keys() [all …]
|
H A D | commands-posix-ssh.c | 39 #define g_unix_get_passwd_entry(username, err) \ argument 40 test_get_passwd_entry(username, err) 44 get_passwd_entry(const char *username, Error **errp) in get_passwd_entry() argument 49 p = g_unix_get_passwd_entry(username, &err); in get_passwd_entry() 52 username, err->message); in get_passwd_entry() 113 qmp_guest_ssh_add_authorized_keys(const char *username, strList *keys, in qmp_guest_ssh_add_authorized_keys() argument 130 p = get_passwd_entry(username, errp); in qmp_guest_ssh_add_authorized_keys() 163 qmp_guest_ssh_remove_authorized_keys(const char *username, strList *keys, in qmp_guest_ssh_remove_authorized_keys() argument 177 p = get_passwd_entry(username, errp); in qmp_guest_ssh_remove_authorized_keys() 212 qmp_guest_ssh_get_authorized_keys(const char *username, Error **errp) in qmp_guest_ssh_get_authorized_keys() argument [all …]
|
H A D | commands-windows-ssh.h | 18 char *username; member
|
H A D | qapi-schema.json | 1060 # @username: the user account whose password to change 1082 'data': { 'username': 'str', 'password': 'str', 'crypted': 'bool' } } 1582 # @username: the user account to add the authorized keys 1589 'data': { 'username': 'str' }, 1599 # @username: the user account to add the authorized keys 1609 'data': { 'username': 'str', 'keys': ['str'], '*reset': 'bool' } 1619 # @username: the user account to remove the authorized keys 1627 'data': { 'username': 'str', 'keys': ['str'] }
|
H A D | commands-posix.c | 2148 void qmp_guest_set_user_password(const char *username, in qmp_guest_set_user_password() argument 2169 if (strchr(username, '\n') || in qmp_guest_set_user_password() 2170 strchr(username, ':')) { in qmp_guest_set_user_password() 2178 const char *argv[] = {"pw", "usermod", "-n", username, in qmp_guest_set_user_password() 2181 g_autofree char *chpasswddata = g_strdup_printf("%s:%s\n", username, in qmp_guest_set_user_password() 2194 void qmp_guest_set_user_password(const char *username, in qmp_guest_set_user_password() argument
|
H A D | commands-win32.c | 1915 void qmp_guest_set_user_password(const char *username, in qmp_guest_set_user_password() argument 1939 user = g_utf8_to_utf16(username, -1, NULL, NULL, &gerr); in qmp_guest_set_user_password()
|
/qemu/ |
H A D | qemu.sasl | 22 # 'scram-sha-256' plugin allows plain username/password authentication 37 # If using scram-sha-256 for username/passwds, then this is the file 38 # containing the passwds. Use 'saslpasswd2 -a qemu [username]'
|
H A D | qemu-options.hx | 2589 the client's SASL username will validated. This object is only 2596 x509 distinguished name and SASL username. It results in the 2598 ``vnc.username`` and ``vnc.x509dname``. The rules for these 5000 "-run-with [async-teardown=on|off][,chroot=dir][user=username|uid:gid]\n" 5008 ``-run-with [async-teardown=on|off][,chroot=dir][user=username|uid:gid]`` 5027 by switching to the specified user (via username) or user and group 5298 ``-object tls-creds-psk,id=id,endpoint=endpoint,dir=/path/to/keys/dir[,username=username]`` 5305 For clients only, ``username`` is the username which will be 5309 called "dir/keys.psk" and contains "username:key" pairs. This 5781 usually a TLS x509 distinguished name, or a SASL username. [all …]
|
/qemu/tests/avocado/avocado_qemu/ |
H A D | __init__.py | 409 def ssh_connect(self, username, credential, credential_is_key=True): argument 419 user=username, key=credential) 422 user=username, password=credential) 561 username = 'root' variable in LinuxTest 649 username=self.username, 681 self.ssh_connect(self.username, self.ssh_key)
|
/qemu/docs/system/ |
H A D | authz.rst | 39 * SASL username. 42 completion of the SASL authentication mechanism, a username will be 43 provided. The format of this username will vary depending on the choice 46 attached ``joebloggs@QEMU.ORG``. Whatever format the username is presented 69 configured with SASL and the username of only that tenant listed. 210 If x509 cert was being used as the username, a suitable 249 While to validate both the x509 certificate and SASL username:
|
H A D | device-url-syntax.rst.inc | 32 Example (CHAP username/password via URL): 38 Example (CHAP username/password via environment variables): 135 <protocol>://[<username>[:<password>]@]<host>/<path> 142 ``username`` 143 Optional username for authentication to the remote server.
|
H A D | vnc-security.rst | 172 username/password auth facility similar to DIGEST-MD5, but does not 189 When using TLS, if username+password authentication is desired, then a
|
H A D | qemu-block-drivers.rst.inc | 577 iscsi://[<username>[%<password>]@]<host>[:<port>]/<target-iqn-name>/<lun> 581 Alternatively the username and password can also be set via environment 586 export LIBISCSI_CHAP_USERNAME=<username> 617 user = "CHAP username" 628 user = "CHAP username" 771 username is tried.
|
H A D | tls.rst | 323 containing ``keys.psk`` and an optional username (defaults to "qemu"):: 326 --object tls-creds-psk,id=tls0,dir=/tmp/keys,username=rich,endpoint=client \
|
/qemu/ui/ |
H A D | vnc-auth-sasl.c | 63 g_free(vs->sasl.username); in vnc_sasl_client_cleanup() 65 vs->sasl.username = vs->sasl.mechlist = NULL; in vnc_sasl_client_cleanup() 186 vs->sasl.username = g_strdup((const char*)val); in vnc_auth_sasl_check_access() 187 trace_vnc_auth_sasl_username(vs, vs->sasl.username); in vnc_auth_sasl_check_access() 195 vs->sasl.username, &err); in vnc_auth_sasl_check_access()
|
H A D | vnc-auth-sasl.h | 57 char *username; member
|
H A D | vnc.c | 268 client->sasl.username) { in vnc_client_cache_auth() 269 client->info->sasl_username = g_strdup(client->sasl.username); in vnc_client_cache_auth() 342 if (client->sasl.conn && client->sasl.username) { in qmp_query_vnc_client() 343 info->sasl_username = g_strdup(client->sasl.username); in qmp_query_vnc_client()
|
/qemu/block/ |
H A D | curl.c | 121 char *username; member 493 if (s->username) { in curl_init_state() 494 if (curl_easy_setopt(state->curl, CURLOPT_USERNAME, s->username)) { in curl_init_state() 773 s->username = g_strdup(qemu_opt_get(opts, CURL_BLOCK_OPT_USERNAME)); in curl_open() 882 g_free(s->username); in curl_open() 990 g_free(s->username); in curl_close() 1008 s->cookie || s->username || s->password || s->proxyusername || in curl_refresh_filename()
|
/qemu/tests/qemu-iotests/ |
H A D | 233 | 206 obj1=tls-creds-psk,dir=${tls_dir}/psk1,username=psk1,endpoint=client,id=tls0 215 obj1=tls-creds-psk,dir=${tls_dir}/psk2,username=psk2,endpoint=client,id=tls0
|
/qemu/tests/vm/ |
H A D | conf_example_aarch64.yml | 9 # Login username and password(has to be sudo enabled)
|
H A D | conf_example_x86.yml | 9 # Login username and password(has to be sudo enabled)
|
/qemu/qapi/ |
H A D | crypto.json | 550 # @username: the username which will be sent to the server. For 564 '*username': 'str' } }
|
/qemu/docs/tools/ |
H A D | qemu-nbd.rst | 273 --object tls-creds-psk,id=tls0,dir=/tmp/keys,username=eblake,endpoint=client \
|