Lines Matching +full:random +full:- +full:access
45 ${uuid}= Remove String ${uuid} -
63 # [channel_protocol_type]: IPMB-1.0
64 # [session_support]: multi-session
69 # [per-message_auth]: enabled
72 # [Non-Volatile Settings]:
74 # [per-message_auth]: enabled
80 ${channel_volatile_data_config}= Get Channel Access Config /run/ipmi/channel_access_volatile.json
81 ${channel_nv_data_config}= Get Channel Access Config /var/lib/ipmi/channel_access_nv.json
106 Valid Value disabled_ipmi_conf_map['${channel_info_ipmi['volatile(active)_settings']['per-message_auth']}']
115 # Verify Non-Volatile Settings
116 Valid Value disabled_ipmi_conf_map['${channel_info_ipmi['non-volatile_settings']['alerting']}']
119 Valid Value disabled_ipmi_conf_map['${channel_info_ipmi['non-volatile_settings']['per-message_auth']}']
122 Valid Value disabled_ipmi_conf_map['${channel_info_ipmi['non-volatile_settings']['user_level_auth']}']
125 Valid Value access_mode_ipmi_conf_map['${channel_info_ipmi['non-volatile_settings']['access_mode']}']
193 # The "close session command" can be tested with any out-of-band IPMI command.
196 ${cmd}= Catenate mc info -vvv 2>&1 | grep "Closed Session"
252 # Generate a random power cap value within the allowable range.
253 ${random_power_cap}= Evaluate random.randint(${min_power_value}, ${max_power_value}) modules=random
264 [Documentation] Verify the power cap value via IPMI, set to non-zero using Redfish
282 # Generate a random power cap value within the allowable range.
283 ${random_power_cap}= Evaluate random.randint(${min_power_value}, ${max_power_value}) modules=random
351 # According to IPMI spec privilege level except 0x00-0x05, others are
386 # privilege_level User Privilege level (e.g. 4-Administator, 3-Operator, 2-Readonly).
396 Valid Value channel_auth_cap['non-null_user_names_exist'] ['yes']
422 # e.g. high - add extra byte to request data like "0x06 0x38 0x01 0x04 0x01".
423 # low - reduce bytes in actual request data like "0x06 0x38".