/openbmc/openbmc-test-automation/security/ |
H A D | test_bmc_expire_password.robot | 2 Documentation Test root user expire password. 28 Expire Root Password And Check IPMI Access Fails 29 [Documentation] Expire root user password and expect an error while access via IPMI. 33 Expire Password ${OPENBMC_USERNAME} 39 Expire Root Password And Check SSH Access Fails 40 [Documentation] Expire root user password and expect an error while access via SSH. 44 Expire Password ${OPENBMC_USERNAME} 51 Expire And Change Root User Password And Access Via SSH 52 [Documentation] Expire and change root user password and access via SSH. 55 ... Restore Default Password For Root User AND FFDC On Test Case Fail [all …]
|
/openbmc/docs/designs/ |
H A D | expired-password.md | 11 OpenBMC has a default password, connects to the network via DHCP, and does not 12 have a mechanism to require administrators to change the BMC's password. This 19 password be changed on the initial signon. This reduces the time window when the 20 system is accessible with a default password. 26 1. Success, when the access credentials (such as username and password) are 30 password) may be expired. 32 account is valid except the account's password is expired (such as indicated 38 PasswordChangeRequired by implementing a "password change dialog". 40 The [Redfish Specification version 1.7.0][] section 13.2.6.1 ("Password change 42 PasswordChangeRequired property which supports a password change dialog. [all …]
|
H A D | estoraged.md | 20 password. 33 capability, which facilitates password management so that we can do things like 34 change the password without re-encrypting the entire device. 49 - Encryption Password: The password needed to load the volume key into RAM and 51 - Device Password: The password to lock or unlock the device hardware. 61 - Change the password 79 client daemon to provide a password. For example, this password could come from 92 - (method) Change Password 110 library provides functions to create a new LUKS header, set the password, etc. 112 For eMMC devices, we plan to enable the password locking feature (CMD42), to [all …]
|
/openbmc/phosphor-webui/app/profile-settings/controllers/ |
H A D | profile-settings-controller.html | 24 <h2 class="section-title">Change password</h2> 27 <!-- Password --> 29 <label for="password">New password</label> 30 …<p class="label__helper-text">Password must between <span class="nowrap">{{minPasswordLength}} – {… 31 <input id="password" 32 name="password" 33 type="password" 37 autocomplete="new-password" 38 ng-model="password" 39 password-visibility-toggle/> [all …]
|
H A D | profile-settings-controller.js | 19 $scope.password; 23 * Make API call to update user password 24 * @param {string} password 26 const updatePassword = function(password) { argument 28 APIUtils.updateUser($scope.username, null, password) 31 'Password has been updated successfully.')) 34 toastService.error('Unable to update password.') 37 $scope.password = ''; 47 * password length requirement 61 const password = form.password.$viewValue; [all …]
|
/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/ |
H A D | shadow-update-pam-conf.patch | 9 common-password and common-session. 12 See meta/recipes-extended/pam/libpam/pam.d/common-password 36 -password include system-auth 37 +password include common-password 46 -password include system-auth 47 +password include common-password 56 -password include system-auth 57 +password include common-password 66 -password include system-auth 67 +password include common-password [all …]
|
/openbmc/openbmc-test-automation/ipmi/ |
H A D | test_ipmi_user.robot | 74 ... user set password ${random_userid} ${valid_password} 132 Verify Setting IPMI User With Invalid Password 133 [Documentation] Verify error while setting IPMI user with invalid password. 141 # Set invalid password for newly created user. 143 ... user set password ${random_userid} ${invalid_password} 145 # Delay added for user password to get set. 148 Should Contain ${msg} Set User Password command failed 155 # Set invalid password for newly created user. 162 Verify IPMI User Password Via Test Command 163 [Documentation] Verify IPMI user password using test command. [all …]
|
/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_user_account.robot | 81 #username password role_id enabled 90 #username password role_id enabled 99 #username password role_id enabled 103 Verify Redfish Admin User Login With Wrong Password 104 [Documentation] Verify Redfish create admin user with valid password and make sure 105 ... admin user failed to login with wrong password. 107 [Template] Verify Redfish User Login With Wrong Password 109 #username password role_id enabled wrong_password 113 Verify Redfish Operator User Login With Wrong Password 114 [Documentation] Verify Redfish create operator user with valid password and make sure [all …]
|
H A D | test_ipmi_redfish_user.robot | 37 ... UserName=${random_username} Password=${valid_password} 42 # Delay added for created new user password to get set. 45 Verify IPMI Username And Password ${random_username} ${valid_password} 48 Update User Password Via Redfish And Verify Using IPMI 49 [Documentation] Update user password via Redfish and verify using IPMI. 57 ... UserName=${random_username} Password=${valid_password} 62 # Update user password using Redfish. 63 ${payload}= Create Dictionary Password=${valid_password2} 66 # Verify that IPMI command works with new password and fails with older password. 67 Verify IPMI Username And Password ${random_username} ${valid_password2} [all …]
|
/openbmc/bios-settings-mgr/include/ |
H A D | password.hpp | 25 #include <xyz/openbmc_project/BIOSConfig/Password/server.hpp> 33 "/xyz/openbmc_project/bios_config/password"; 40 using Base = sdbusplus::xyz::openbmc_project::BIOSConfig::server::Password; 43 /** @class Password 45 * @brief Implements the BIOS Password 47 class Password : public Base class 50 Password() = delete; 51 ~Password() = default; 52 Password(const Password&) = delete; 53 Password& operator=(const Password&) = delete; [all …]
|
/openbmc/openbmc-test-automation/lib/ |
H A D | host.tcl | 46 proc get_host_domain {host username password {quiet 1}} { 58 # password The host password. 64 "sshpass -p $password ssh -o StrictHostKeyChecking=no -k $username@$host\ 71 proc get_host_name_servers {host username password {quiet 1}} { 83 # password The host password. 88 lassign [cmd_fnc "sshpass -p $password ssh -o StrictHostKeyChecking=no -k\ 97 proc get_host_mac_address {host username password {interface {}} {quiet 1}} { 111 # password The host password. 119 $password $quiet] 120 lassign [cmd_fnc "sshpass -p $password ssh -o StrictHostKeyChecking=no -k\ [all …]
|
H A D | redfish_request.robot | 17 [Arguments] ${user_name} ${password} 21 # password Password of BMC. 25 ${data}= Create Dictionary UserName=${user_name} Password=${password} Oem=${oem_data} 36 [Arguments] ${user_name} ${password} 40 # password Password of BMC. 43 ${session_resp}= Redfish Generic Login Request ${user_name} ${password}
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 293.out | 9 == adding a password to slot 4 == 10 == adding a password to slot 1 == 11 == adding a password to slot 3 == 12 == adding a password to slot 2 == 26 qemu-io: can't open: Invalid password, cannot unlock any keyslot 29 qemu-io: can't open: Invalid password, cannot unlock any keyslot 54 qemu-img: All the active keyslots match the (old) password that was given and erasing them will era… 57 qemu-io: can't open: Invalid password, cannot unlock any keyslot 58 qemu-io: can't open: Invalid password, cannot unlock any keyslot 59 qemu-io: can't open: Invalid password, cannot unlock any keyslot [all …]
|
/openbmc/webui-vue/src/views/ChangePassword/ |
H A D | ChangePassword.vue | 2 <div class="change-password-container"> 16 label-for="password" 19 <input-password-toggle> 21 id="password" 22 v-model="form.password" 24 type="password" 25 :state="getValidationState(v$.form.password)" 27 @change="v$.form.password.$touch()" 31 <template v-if="v$.form.password.required.$invalid"> 35 </input-password-toggle> [all …]
|
/openbmc/phosphor-webui/app/access-control/controllers/ |
H A D | user-accounts-modal-user.html | 107 <!-- Password --> 109 <label for="password">User password</label> 110 …<p class="label__helper-text">Password must between <span class="nowrap">{{modalCtrl.minPasswordLe… 111 <input id="password" 112 name="password" 113 type="password" 116 autocomplete="new-password" 117 … ng-required="modalCtrl.user.new || form.password.$touched || form.passwordConfirm.$touched" 118 ng-model="modalCtrl.user.password" 119 password-visibility-toggle [all …]
|
/openbmc/openbmc-test-automation/openpower/localuser/ |
H A D | test_ipmi_redfish_user.robot | 48 ... UserName=${random_username} Password=${valid_password} 53 # Add delay for a new admin user password to set. 58 # Update user password using Redfish. 59 ${payload}= Create Dictionary Password=${valid_password2} 62 Verify IPMI Username And Password ${random_username} ${valid_password2} 74 ... UserName=${random_username} Password=${valid_password} 81 # Update user password using Redfish. 82 ${payload}= Create Dictionary Password=${valid_password2} 90 ... Verify IPMI Username And Password ${random_username} ${valid_password2} 93 Update User Password Via Redfish And Verify Using IPMI [all …]
|
/openbmc/webui-vue/src/views/Login/ |
H A D | Login.vue | 35 <label for="password">{{ $t('pageLogin.password') }}</label> 36 <input-password-toggle> 38 id="password" 39 v-model="userInfo.password" 40 aria-describedby="login-error-alert password-required" 41 :state="getValidationState(v$.userInfo.password)" 42 type="password" 43 data-test-id="login-input-password" 45 @input="v$.userInfo.password.$touch()" 48 <b-form-invalid-feedback id="password-required" role="alert"> [all …]
|
/openbmc/phosphor-webui/app/login/controllers/ |
H A D | login-controller.html | 11 <b>Invalid username or password.</b> 15 …__form.host.$pristine" required autofocus ng-keydown="tryLogin(host, username, password, $event)"> 22 …tine" required ng-model="username" ng-keydown="tryLogin(host, username, password, $event)" autocom… 27 <label for="password">Password</label> 28 …password" id="password" name="password" has-error="invalidCredentials && login__form.$pristine" re… 29 …<div ng-messages="login__form.password.$error" class="form-error" ng-class="{'visible': login__for… 33 …e="button" value="Log in" role="button" ng-click="login(host, username, password); submitted = tru…
|
/openbmc/openbmc/meta-google/recipes-extended/pam/ |
H A D | libpam_%.bbappend | 8 sed -i '/pam_pwquality.so/d' ${D}${sysconfdir}/pam.d/common-password 11 # with "password". This makes sure that if pam_pwquality.so was the first 14 # the user for a new password but use the one provided by the previously 15 # stacked password module". Since there is no "previous" entry, it never 16 # asks for a password which causes the process to fail. 17 awk '/^password/ && !f{sub(/ use_authtok/, ""); f=1} 1' \ 18 ${D}${sysconfdir}/pam.d/common-password \ 19 > ${D}${sysconfdir}/pam.d/common-password.new 20 mv ${D}${sysconfdir}/pam.d/common-password.new \ 21 ${D}${sysconfdir}/pam.d/common-password
|
/openbmc/openbmc-test-automation/gui/test/access_control/ |
H A D | test_obmc_gui_local_users.robot | 23 ${xpath_input_password} //input[@id="password"] 89 [Arguments] ${username} ${password} ${privilege}=Administrator 94 # password New user password. 99 Add User Details ${username} ${password} ${privilege} ${account_status} 103 [Arguments] ${username} ${password} ${privilege} ${account_status} 107 # password User password. 118 Input Password ${xpath_input_password} ${password} 119 Input Password ${xpath_confirm_password} ${password} 150 [Arguments] ${username} ${password} ${expected_result}=${True} 154 # password User password. [all …]
|
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/ |
H A D | common-password | 2 # /etc/pam.d/common-password - password-related modules common to all services 16 password [success=ok default=die] pam_pwquality.so debug 17 password [success=ok default=die] pam_ipmicheck.so spec_grp_name=ipmi use_authtok 18 password [success=ok ignore=ignore default=die] pam_pwhistory.so debug use_authtok 19 password [success=ok default=die] pam_unix.so sha512 use_authtok 20 password [success=1 default=die] pam_ipmisave.so spec_grp_name=ipmi spec_pass_file=/etc/ipmi_pass … 22 password requisite pam_deny.so 26 password required pam_permit.so
|
/openbmc/phosphor-webui/app/common/directives/password-visibility-toggle/ |
H A D | password-visibility-toggle.js | 5 * Password visibility toggle 8 * from password/text to show/hide the value of a password 12 * <input type="password" password-visibility-toggle /> 25 class="btn btn-tertiary btn-password-toggle" 27 'password-visible': visible, 28 'password-hidden': !visible 38 const type = instanceScope.visible ? 'text' : 'password';
|
/openbmc/webui-vue/src/views/SecurityAndAccess/UserManagement/ |
H A D | ModalUser.vue | 130 label-for="password" 132 <b-form-text id="password-help-block"> 140 <input-password-toggle> 142 id="password" 143 v-model="form.password" 144 type="password" 145 data-test-id="userManagement-input-password" 146 aria-describedby="password-help-block" 147 :state="getValidationState(v$.form.password)" 149 @input="v$.form.password.$touch()" [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/ |
H A D | 0007-greeter.c-support-to-update-expired-password.patch | 4 Subject: [PATCH 7/8] greeter.c: support to update expired password 6 Update greeter to work with ui to handle expired password. It checks 7 whether password is expired after input user and password. If expired, 8 force user to update password immediately. It allows 3 times to try. If 35 - gtk_label_set_text( GTK_LABEL(prompt), _("Password:") ); 38 + gtk_label_set_text(GTK_LABEL(prompt), _("New password:")); 40 + gtk_label_set_text(GTK_LABEL(prompt), _("Retype new password:")); 43 + gtk_label_set_text( GTK_LABEL(prompt), _("Password:") ); 83 + // if new password is same as old one 97 + printf("update-new-password user=%s newpass=%s session=%s lang=%s\n", [all …]
|
/openbmc/ipmitool/lib/ |
H A D | ipmi_user.c | 179 /* _ipmi_set_user_password - Set User Password command. 183 * @operation - which operation to perform(en/disable user, set/test password) 184 * @password - User Password 185 * @is_twenty_byte - 0 = store as 16byte, otherwise store as 20byte password 191 uint8_t operation, const char *password, in _ipmi_set_user_password() argument 206 if (password != NULL) { in _ipmi_set_user_password() 207 size_t copy_len = strlen(password); in _ipmi_set_user_password() 213 strncpy((char *)(data + 2), password, copy_len); in _ipmi_set_user_password() 393 * set to test password and interpret result. 397 const char *password, uint8_t is_twenty_byte_password) in ipmi_user_test_password() argument [all …]
|