/openbmc/qemu/qga/ |
H A D | commands-windows-ssh.c | 39 * Frees userInfo structure. This implements the g_auto cleanup 132 * userInfo -> Information about the current user 137 static bool create_acl_user(PWindowsUserInfo userInfo, PACL *pACL, Error **errp) in create_acl_user() argument 145 bool converted = ConvertStringSidToSid(userInfo->SSID, &userPSID); in create_acl_user() 148 userInfo->username); in create_acl_user() 176 userInfo->username, setResult); in create_acl_user() 283 * userInfo -> pointer to structure that contains information about the user 289 static bool create_acl(PWindowsUserInfo userInfo, PACL *pACL, Error **errp) in create_acl() argument 303 if (!userInfo->isAdmin) { in create_acl() 304 if (!create_acl_user(userInfo, pACL, errp)) { in create_acl() [all …]
|
/openbmc/phosphor-host-ipmid/user_channel/ |
H A D | user_layer.cpp | 139 UserInfo* userInfo = getUserAccessObject().getUserInfo(userId); in ipmiUserCheckEnabled() local 140 state = userInfo->userEnabled; in ipmiUserCheckEnabled() 157 UserInfo* userInfo = getUserAccessObject().getUserInfo(userId); in ipmiUserGetPrivilegeAccess() local 158 privAccess.privilege = userInfo->userPrivAccess[chNum].privilege; in ipmiUserGetPrivilegeAccess() 159 privAccess.ipmiEnabled = userInfo->userPrivAccess[chNum].ipmiEnabled; in ipmiUserGetPrivilegeAccess() 161 userInfo->userPrivAccess[chNum].linkAuthEnabled; in ipmiUserGetPrivilegeAccess() 162 privAccess.accessCallback = userInfo->userPrivAccess[chNum].accessCallback; in ipmiUserGetPrivilegeAccess() 223 UserInfo* userInfo = getUserAccessObject().getUserInfo(userId); in ipmiUserGetUserPayloadAccess() local 226 userInfo->payloadAccess[chNum].stdPayloadEnables1; in ipmiUserGetUserPayloadAccess() 228 userInfo->payloadAccess[chNum].stdPayloadEnables2Reserved; in ipmiUserGetUserPayloadAccess() [all …]
|
H A D | user_mgmt.cpp | 360 UserInfo* UserAccess::getUserInfo(const uint8_t userId) in getUserInfo() 366 void UserAccess::setUserInfo(const uint8_t userId, UserInfo* userInfo) in setUserInfo() argument 369 std::copy(reinterpret_cast<uint8_t*>(userInfo), in setUserInfo() 370 reinterpret_cast<uint8_t*>(userInfo) + sizeof(*userInfo), in setUserInfo() 689 UserInfo* userInfo = getUserInfo(userId); in setUserEnabledState() local 692 safeUsernameAssign(userName, userInfo->userName); in setUserEnabledState() 699 if (userInfo->userEnabled != enabledState) in setUserEnabledState() 706 userInfo->userEnabled = enabledState; in setUserEnabledState() 745 UserInfo* userInfo = getUserInfo(userId); in setUserPayloadAccess() local 749 userInfo->payloadAccess[chNum].stdPayloadEnables1 |= in setUserPayloadAccess() [all …]
|
H A D | user_mgmt.hpp | 153 /** @struct UserInfo 157 struct UserInfo struct 174 UserInfo user[ipmiMaxUsers + 1]; 275 * @return UserInfo for the specified user id 277 UserInfo* getUserInfo(const uint8_t userId); 282 * @param[in] userInfo - user information 285 void setUserInfo(const uint8_t userId, UserInfo* userInfo); 347 /** @brief to get user payload access details from userInfo entry. 349 * @param[in] userInfo - userInfo entry in usersTbl. 354 * available in the given userInfo entry (from usersTbl). [all …]
|
/openbmc/webui-vue/src/views/Login/ |
H A D | Login.vue | 19 v-model="userInfo.username" 21 :state="getValidationState(v$.userInfo.username)" 25 @input="v$.userInfo.username.$touch()" 29 <template v-if="v$.userInfo.username.required.$invalid"> 39 v-model="userInfo.password" 41 :state="getValidationState(v$.userInfo.password)" 45 @input="v$.userInfo.password.$touch()" 49 <template v-if="v$.userInfo.password.required.$invalid"> 94 userInfo: { 121 userInfo: { [all …]
|
/openbmc/phosphor-user-manager/test/ |
H A D | user_mgr_test.cpp | 109 UserInfoMap userInfo; in TEST_F() local 113 EXPECT_THROW(userInfo = mockManager.getUserInfo(userName), in TEST_F() 119 UserInfoMap userInfo; in TEST_F() local 126 userInfo = mockManager.getUserInfo(userName); in TEST_F() 128 EXPECT_EQ(privilege, std::get<std::string>(userInfo["UserPrivilege"])); in TEST_F() 130 std::get<std::vector<std::string>>(userInfo["UserGroups"])); in TEST_F() 131 EXPECT_EQ(true, std::get<bool>(userInfo["UserEnabled"])); in TEST_F() 132 EXPECT_EQ(false, std::get<bool>(userInfo["UserLockedForFailedAttempt"])); in TEST_F() 133 EXPECT_EQ(false, std::get<bool>(userInfo["UserPasswordExpired"])); in TEST_F() 134 EXPECT_EQ(false, std::get<bool>(userInfo["RemoteUser"])); in TEST_F() [all …]
|
/openbmc/phosphor-misc/http-redirect/ |
H A D | http-redirect.awk | 261 # Parse userinfo@host:port 263 userinfo = substr(url, 1, RSTART - 1) 266 components["userinfo"] = userinfo 267 if (match(userinfo, ":")) { 269 components["password"] = substr(userinfo, RSTART + 1) 270 userinfo = substr(userinfo, RSTART - 1) 272 components["user"] = userinfo; 295 r=r dump_field_if_present("userinfo", components) 310 if (("frag" in split_url) || ("userinfo" in split_url))
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/User/ |
H A D | Manager.interface.yaml | 78 - name: UserInfo 92 1.UserInfo["RemoteUser"] returns true for ldap user 94 2.UserInfo["UserGroups"] gets list of groups of user.
|
/openbmc/openbmc/poky/bitbake/lib/bb/fetch2/ |
H A D | sftp.py | 96 if urlo.userinfo: 97 user = urlo.userinfo + '@'
|
H A D | __init__.py | 163 * userinfo (authentication information) (read/write) 212 self.userinfo = '' 256 self.userinfo += urlp.username or '' 259 self.userinfo += ':%s' % urlp.password 269 userinfo = self.userinfo 270 if userinfo: 271 userinfo += '@' 276 userinfo, 330 if self.userinfo: 331 return (self.userinfo.split(":", 1))[0] [all …]
|
/openbmc/openbmc/meta-openembedded/meta-gnome/recipes-support/usermode/usermode/ |
H A D | 0001-Makefile.am-Link-with-libm-for-powl-API.patch | 24 userinfo_SOURCES = userinfo.c
|
/openbmc/openbmc/meta-openembedded/meta-gnome/recipes-support/usermode/ |
H A D | usermode_1.114.bb | 5 * userinfo allows users to change their finger information. \
|
/openbmc/phosphor-user-manager/ |
H A D | user_mgr.cpp | 1227 UserInfoMap userInfo; in getUserInfo() local 1232 userInfo.emplace("UserPrivilege", user.get()->userPrivilege()); in getUserInfo() 1233 userInfo.emplace("UserGroups", user.get()->userGroups()); in getUserInfo() 1234 userInfo.emplace("UserEnabled", user.get()->userEnabled()); in getUserInfo() 1235 userInfo.emplace("UserLockedForFailedAttempt", in getUserInfo() 1237 userInfo.emplace("UserPasswordExpired", in getUserInfo() 1239 userInfo.emplace("TOTPSecretkeyRequired", in getUserInfo() 1241 userInfo.emplace("RemoteUser", false); in getUserInfo() 1271 return userInfo; in getUserInfo() 1315 userInfo.emplace("UserPrivilege", userPrivilege); in getUserInfo() [all …]
|
H A D | user_mgr.hpp | 73 using UserInfo = std::variant<Privilege, GroupList, UserEnabled>; typedef 74 using UserInfoMap = std::map<PropertyName, UserInfo>;
|
/openbmc/openbmc/poky/bitbake/lib/bb/tests/ |
H A D | fetch.py | 71 'userinfo': '', 85 'userinfo': '', 101 'userinfo': '', 117 'userinfo': '', 136 'userinfo': '', 154 'userinfo': '', 168 'userinfo': 'anoncvs', 184 'userinfo': 'anoncvs:anonymous', 201 'userinfo': '', 215 'userinfo': '', [all …]
|
/openbmc/qemu/tools/i386/ |
H A D | qemu-vmsr-helper.c | 401 struct passwd *userinfo = getpwnam(optarg); in main() local 402 if (userinfo) { in main() 403 uid = userinfo->pw_uid; in main()
|
/openbmc/qemu/scsi/ |
H A D | qemu-pr-helper.c | 933 struct passwd *userinfo = getpwnam(optarg); in main() local 934 if (userinfo) { in main() 935 uid = userinfo->pw_uid; in main()
|
/openbmc/qemu/ui/ |
H A D | cocoa.m | 340 …ventRef handleTapEvent(CGEventTapProxy proxy, CGEventType type, CGEventRef cgEvent, void *userInfo) 342 QemuCocoaView *view = userInfo; 370 userInfo:nil];
|