Home
last modified time | relevance | path

Searched full:password (Results 1 – 25 of 773) sorted by relevance

12345678910>>...31

/openbmc/openbmc-test-automation/security/
H A Dtest_bmc_expire_password.robot2 Documentation Test root user expire password.
28 Expire Root Password And Check IPMI Access Fails
29 [Documentation] Expire root user password and expect an error while access via IPMI.
33 Expire Password ${OPENBMC_USERNAME}
39 Expire Root Password And Check SSH Access Fails
40 [Documentation] Expire root user password and expect an error while access via SSH.
44 Expire Password ${OPENBMC_USERNAME}
51 Expire And Change Root User Password And Access Via SSH
52 [Documentation] Expire and change root user password and access via SSH.
55 ... Restore Default Password For Root User AND FFDC On Test Case Fail
[all …]
/openbmc/docs/designs/
H A Dexpired-password.md11 OpenBMC has a default password, connects to the network via DHCP, and does not
12 have a mechanism to require administrators to change the BMC's password. This
19 password be changed on the initial signon. This reduces the time window when the
20 system is accessible with a default password.
26 1. Success, when the access credentials (such as username and password) are
30 password) may be expired.
32 account is valid except the account's password is expired (such as indicated
38 PasswordChangeRequired by implementing a "password change dialog".
40 The [Redfish Specification version 1.7.0][] section 13.2.6.1 ("Password change
42 PasswordChangeRequired property which supports a password change dialog.
[all …]
H A Destoraged.md20 password.
33 capability, which facilitates password management so that we can do things like
34 change the password without re-encrypting the entire device.
49 - Encryption Password: The password needed to load the volume key into RAM and
51 - Device Password: The password to lock or unlock the device hardware.
61 - Change the password
79 client daemon to provide a password. For example, this password could come from
92 - (method) Change Password
110 library provides functions to create a new LUKS header, set the password, etc.
112 For eMMC devices, we plan to enable the password locking feature (CMD42), to
[all …]
/openbmc/phosphor-webui/app/profile-settings/controllers/
H A Dprofile-settings-controller.html24 <h2 class="section-title">Change password</h2>
27 <!-- Password -->
29 <label for="password">New password</label>
30 …<p class="label__helper-text">Password must between <span class="nowrap">{{minPasswordLength}} – {…
31 <input id="password"
32 name="password"
33 type="password"
37 autocomplete="new-password"
38 ng-model="password"
39 password-visibility-toggle/>
[all …]
H A Dprofile-settings-controller.js19 $scope.password;
23 * Make API call to update user password
24 * @param {string} password
26 const updatePassword = function(password) { argument
28 APIUtils.updateUser($scope.username, null, password)
31 'Password has been updated successfully.'))
34 toastService.error('Unable to update password.')
37 $scope.password = '';
47 * password length requirement
61 const password = form.password.$viewValue;
[all …]
/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/
H A Dshadow-update-pam-conf.patch9 common-password and common-session.
12 See meta/recipes-extended/pam/libpam/pam.d/common-password
36 -password include system-auth
37 +password include common-password
46 -password include system-auth
47 +password include common-password
56 -password include system-auth
57 +password include common-password
66 -password include system-auth
67 +password include common-password
[all …]
/openbmc/openbmc-test-automation/ipmi/
H A Dtest_ipmi_user.robot74 ... user set password ${random_userid} ${valid_password}
132 Verify Setting IPMI User With Invalid Password
133 [Documentation] Verify error while setting IPMI user with invalid password.
141 # Set invalid password for newly created user.
143 ... user set password ${random_userid} ${invalid_password}
145 # Delay added for user password to get set.
148 Should Contain ${msg} Set User Password command failed
155 # Set invalid password for newly created user.
162 Verify IPMI User Password Via Test Command
163 [Documentation] Verify IPMI user password using test command.
[all …]
/openbmc/openbmc-test-automation/redfish/account_service/
H A Dtest_user_account.robot81 #username password role_id enabled
90 #username password role_id enabled
99 #username password role_id enabled
103 Verify Redfish Admin User Login With Wrong Password
104 [Documentation] Verify Redfish create admin user with valid password and make sure
105 ... admin user failed to login with wrong password.
107 [Template] Verify Redfish User Login With Wrong Password
109 #username password role_id enabled wrong_password
113 Verify Redfish Operator User Login With Wrong Password
114 [Documentation] Verify Redfish create operator user with valid password and make sure
[all …]
H A Dtest_ipmi_redfish_user.robot37 ... UserName=${random_username} Password=${valid_password}
42 # Delay added for created new user password to get set.
45 Verify IPMI Username And Password ${random_username} ${valid_password}
48 Update User Password Via Redfish And Verify Using IPMI
49 [Documentation] Update user password via Redfish and verify using IPMI.
57 ... UserName=${random_username} Password=${valid_password}
62 # Update user password using Redfish.
63 ${payload}= Create Dictionary Password=${valid_password2}
66 # Verify that IPMI command works with new password and fails with older password.
67 Verify IPMI Username And Password ${random_username} ${valid_password2}
[all …]
/openbmc/bios-settings-mgr/include/
H A Dpassword.hpp25 #include <xyz/openbmc_project/BIOSConfig/Password/server.hpp>
33 "/xyz/openbmc_project/bios_config/password";
40 using Base = sdbusplus::xyz::openbmc_project::BIOSConfig::server::Password;
43 /** @class Password
45 * @brief Implements the BIOS Password
47 class Password : public Base class
50 Password() = delete;
51 ~Password() = default;
52 Password(const Password&) = delete;
53 Password& operator=(const Password&) = delete;
[all …]
/openbmc/openbmc-test-automation/lib/
H A Dhost.tcl46 proc get_host_domain {host username password {quiet 1}} {
58 # password The host password.
64 "sshpass -p $password ssh -o StrictHostKeyChecking=no -k $username@$host\
71 proc get_host_name_servers {host username password {quiet 1}} {
83 # password The host password.
88 lassign [cmd_fnc "sshpass -p $password ssh -o StrictHostKeyChecking=no -k\
97 proc get_host_mac_address {host username password {interface {}} {quiet 1}} {
111 # password The host password.
119 $password $quiet]
120 lassign [cmd_fnc "sshpass -p $password ssh -o StrictHostKeyChecking=no -k\
[all …]
H A Dredfish_request.robot17 [Arguments] ${user_name} ${password}
21 # password Password of BMC.
25 ${data}= Create Dictionary UserName=${user_name} Password=${password} Oem=${oem_data}
36 [Arguments] ${user_name} ${password}
40 # password Password of BMC.
43 ${session_resp}= Redfish Generic Login Request ${user_name} ${password}
/openbmc/qemu/tests/qemu-iotests/
H A D293.out9 == adding a password to slot 4 ==
10 == adding a password to slot 1 ==
11 == adding a password to slot 3 ==
12 == adding a password to slot 2 ==
26 qemu-io: can't open: Invalid password, cannot unlock any keyslot
29 qemu-io: can't open: Invalid password, cannot unlock any keyslot
54 qemu-img: All the active keyslots match the (old) password that was given and erasing them will era…
57 qemu-io: can't open: Invalid password, cannot unlock any keyslot
58 qemu-io: can't open: Invalid password, cannot unlock any keyslot
59 qemu-io: can't open: Invalid password, cannot unlock any keyslot
[all …]
/openbmc/webui-vue/src/views/ChangePassword/
H A DChangePassword.vue2 <div class="change-password-container">
16 label-for="password"
19 <input-password-toggle>
21 id="password"
22 v-model="form.password"
24 type="password"
25 :state="getValidationState(v$.form.password)"
27 @change="v$.form.password.$touch()"
31 <template v-if="v$.form.password.required.$invalid">
35 </input-password-toggle>
[all …]
/openbmc/phosphor-webui/app/access-control/controllers/
H A Duser-accounts-modal-user.html107 <!-- Password -->
109 <label for="password">User password</label>
110 …<p class="label__helper-text">Password must between <span class="nowrap">{{modalCtrl.minPasswordLe…
111 <input id="password"
112 name="password"
113 type="password"
116 autocomplete="new-password"
117 … ng-required="modalCtrl.user.new || form.password.$touched || form.passwordConfirm.$touched"
118 ng-model="modalCtrl.user.password"
119 password-visibility-toggle
[all …]
/openbmc/openbmc-test-automation/openpower/localuser/
H A Dtest_ipmi_redfish_user.robot48 ... UserName=${random_username} Password=${valid_password}
53 # Add delay for a new admin user password to set.
58 # Update user password using Redfish.
59 ${payload}= Create Dictionary Password=${valid_password2}
62 Verify IPMI Username And Password ${random_username} ${valid_password2}
74 ... UserName=${random_username} Password=${valid_password}
81 # Update user password using Redfish.
82 ${payload}= Create Dictionary Password=${valid_password2}
90 ... Verify IPMI Username And Password ${random_username} ${valid_password2}
93 Update User Password Via Redfish And Verify Using IPMI
[all …]
/openbmc/webui-vue/src/views/Login/
H A DLogin.vue35 <label for="password">{{ $t('pageLogin.password') }}</label>
36 <input-password-toggle>
38 id="password"
39 v-model="userInfo.password"
40 aria-describedby="login-error-alert password-required"
41 :state="getValidationState(v$.userInfo.password)"
42 type="password"
43 data-test-id="login-input-password"
45 @input="v$.userInfo.password.$touch()"
48 <b-form-invalid-feedback id="password-required" role="alert">
[all …]
/openbmc/phosphor-webui/app/login/controllers/
H A Dlogin-controller.html11 <b>Invalid username or password.</b>
15 …__form.host.$pristine" required autofocus ng-keydown="tryLogin(host, username, password, $event)">
22 …tine" required ng-model="username" ng-keydown="tryLogin(host, username, password, $event)" autocom…
27 <label for="password">Password</label>
28password" id="password" name="password" has-error="invalidCredentials && login__form.$pristine" re…
29 …<div ng-messages="login__form.password.$error" class="form-error" ng-class="{'visible': login__for…
33 …e="button" value="Log in" role="button" ng-click="login(host, username, password); submitted = tru…
/openbmc/openbmc/meta-google/recipes-extended/pam/
H A Dlibpam_%.bbappend8 sed -i '/pam_pwquality.so/d' ${D}${sysconfdir}/pam.d/common-password
11 # with "password". This makes sure that if pam_pwquality.so was the first
14 # the user for a new password but use the one provided by the previously
15 # stacked password module". Since there is no "previous" entry, it never
16 # asks for a password which causes the process to fail.
17 awk '/^password/ && !f{sub(/ use_authtok/, ""); f=1} 1' \
18 ${D}${sysconfdir}/pam.d/common-password \
19 > ${D}${sysconfdir}/pam.d/common-password.new
20 mv ${D}${sysconfdir}/pam.d/common-password.new \
21 ${D}${sysconfdir}/pam.d/common-password
/openbmc/openbmc-test-automation/gui/test/access_control/
H A Dtest_obmc_gui_local_users.robot23 ${xpath_input_password} //input[@id="password"]
89 [Arguments] ${username} ${password} ${privilege}=Administrator
94 # password New user password.
99 Add User Details ${username} ${password} ${privilege} ${account_status}
103 [Arguments] ${username} ${password} ${privilege} ${account_status}
107 # password User password.
118 Input Password ${xpath_input_password} ${password}
119 Input Password ${xpath_confirm_password} ${password}
150 [Arguments] ${username} ${password} ${expected_result}=${True}
154 # password User password.
[all …]
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/
H A Dcommon-password2 # /etc/pam.d/common-password - password-related modules common to all services
16 password [success=ok default=die] pam_pwquality.so debug
17 password [success=ok default=die] pam_ipmicheck.so spec_grp_name=ipmi use_authtok
18 password [success=ok ignore=ignore default=die] pam_pwhistory.so debug use_authtok
19 password [success=ok default=die] pam_unix.so sha512 use_authtok
20 password [success=1 default=die] pam_ipmisave.so spec_grp_name=ipmi spec_pass_file=/etc/ipmi_pass …
22 password requisite pam_deny.so
26 password required pam_permit.so
/openbmc/phosphor-webui/app/common/directives/password-visibility-toggle/
H A Dpassword-visibility-toggle.js5 * Password visibility toggle
8 * from password/text to show/hide the value of a password
12 * <input type="password" password-visibility-toggle />
25 class="btn btn-tertiary btn-password-toggle"
27 'password-visible': visible,
28 'password-hidden': !visible
38 const type = instanceScope.visible ? 'text' : 'password';
/openbmc/webui-vue/src/views/SecurityAndAccess/UserManagement/
H A DModalUser.vue130 label-for="password"
132 <b-form-text id="password-help-block">
140 <input-password-toggle>
142 id="password"
143 v-model="form.password"
144 type="password"
145 data-test-id="userManagement-input-password"
146 aria-describedby="password-help-block"
147 :state="getValidationState(v$.form.password)"
149 @input="v$.form.password.$touch()"
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/
H A D0007-greeter.c-support-to-update-expired-password.patch4 Subject: [PATCH 7/8] greeter.c: support to update expired password
6 Update greeter to work with ui to handle expired password. It checks
7 whether password is expired after input user and password. If expired,
8 force user to update password immediately. It allows 3 times to try. If
35 - gtk_label_set_text( GTK_LABEL(prompt), _("Password:") );
38 + gtk_label_set_text(GTK_LABEL(prompt), _("New password:"));
40 + gtk_label_set_text(GTK_LABEL(prompt), _("Retype new password:"));
43 + gtk_label_set_text( GTK_LABEL(prompt), _("Password:") );
83 + // if new password is same as old one
97 + printf("update-new-password user=%s newpass=%s session=%s lang=%s\n",
[all …]
/openbmc/ipmitool/lib/
H A Dipmi_user.c179 /* _ipmi_set_user_password - Set User Password command.
183 * @operation - which operation to perform(en/disable user, set/test password)
184 * @password - User Password
185 * @is_twenty_byte - 0 = store as 16byte, otherwise store as 20byte password
191 uint8_t operation, const char *password, in _ipmi_set_user_password() argument
206 if (password != NULL) { in _ipmi_set_user_password()
207 size_t copy_len = strlen(password); in _ipmi_set_user_password()
213 strncpy((char *)(data + 2), password, copy_len); in _ipmi_set_user_password()
393 * set to test password and interpret result.
397 const char *password, uint8_t is_twenty_byte_password) in ipmi_user_test_password() argument
[all …]

12345678910>>...31