/openbmc/openbmc-test-automation/security/ |
H A D | test_bmc_expire_password.robot | 2 Documentation Test root user expire password. 28 Expire Root Password And Check IPMI Access Fails 29 [Documentation] Expire root user password and expect an error while access via IPMI. 33 Expire Password ${OPENBMC_USERNAME} 39 Expire Root Password And Check SSH Access Fails 40 [Documentation] Expire root user password and expect an error while access via SSH. 44 Expire Password ${OPENBMC_USERNAME} 51 Expire And Change Root User Password And Access Via SSH 52 [Documentation] Expire and change root user password and access via SSH. 55 ... Restore Default Password For Root User AND FFDC On Test Case Fail [all …]
|
/openbmc/docs/designs/ |
H A D | expired-password.md | 11 OpenBMC has a default password, connects to the network via DHCP, and does not 12 have a mechanism to require administrators to change the BMC's password. This 19 password be changed on the initial signon. This reduces the time window when the 20 system is accessible with a default password. 26 1. Success, when the access credentials (such as username and password) are 30 password) may be expired. 32 account is valid except the account's password is expired (such as indicated 38 PasswordChangeRequired by implementing a "password change dialog". 40 The [Redfish Specification version 1.7.0][] section 13.2.6.1 ("Password change 42 PasswordChangeRequired property which supports a password change dialog. [all …]
|
H A D | estoraged.md | 17 password. 30 capability, which facilitates password management so that we can do things like 31 change the password without re-encrypting the entire device. 46 - Encryption Password: The password needed to load the volume key into RAM and 48 - Device Password: The password to lock or unlock the device hardware. 58 - Change the password 76 client daemon to provide a password. For example, this password could come from 89 - (method) Change Password 107 library provides functions to create a new LUKS header, set the password, etc. 109 For eMMC devices, we plan to enable the password locking feature (CMD42), to [all …]
|
/openbmc/phosphor-webui/app/profile-settings/controllers/ |
H A D | profile-settings-controller.html | 24 <h2 class="section-title">Change password</h2> 27 <!-- Password --> 29 <label for="password">New password</label> 30 …<p class="label__helper-text">Password must between <span class="nowrap">{{minPasswordLength}} – {… 31 <input id="password" 32 name="password" 33 type="password" 37 autocomplete="new-password" 38 ng-model="password" 39 password-visibility-toggle/> [all …]
|
H A D | profile-settings-controller.js | 19 $scope.password; 23 * Make API call to update user password 24 * @param {string} password 26 const updatePassword = function(password) { argument 28 APIUtils.updateUser($scope.username, null, password) 31 'Password has been updated successfully.')) 34 toastService.error('Unable to update password.') 37 $scope.password = ''; 47 * password length requirement 61 const password = form.password.$viewValue; [all …]
|
/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/ |
H A D | shadow-update-pam-conf.patch | 9 common-password and common-session. 12 See meta/recipes-extended/pam/libpam/pam.d/common-password 37 -password include system-auth 38 +password include common-password 47 -password include system-auth 48 +password include common-password 57 -password include system-auth 58 +password include common-password 67 -password include system-auth 68 +password include common-password [all …]
|
/openbmc/openbmc-test-automation/ipmi/ |
H A D | test_ipmi_user.robot | 71 ... user set password ${random_userid} ${valid_password} 129 Verify Setting IPMI User With Invalid Password 131 ... password. 139 # Set invalid password for newly created user. 141 ... user set password ${random_userid} ${invalid_password} 143 # Delay added for user password to get set. 146 Should Contain ${msg} Set User Password command failed 154 # Set invalid password for newly created user. 161 Verify IPMI User Password Via Test Command 162 [Documentation] Verify IPMI user password using test command. [all …]
|
/openbmc/bios-settings-mgr/include/ |
H A D | password.hpp | 25 #include <xyz/openbmc_project/BIOSConfig/Password/server.hpp> 33 "/xyz/openbmc_project/bios_config/password"; 40 using Base = sdbusplus::xyz::openbmc_project::BIOSConfig::server::Password; 43 /** @class Password 45 * @brief Implements the BIOS Password 47 class Password : public Base class 50 Password() = delete; 51 ~Password() = default; 52 Password(const Password&) = delete; 53 Password& operator=(const Password&) = delete; [all …]
|
/openbmc/openbmc-test-automation/lib/ |
H A D | host.tcl | 46 proc get_host_domain {host username password {quiet 1}} { 58 # password The host password. 64 "sshpass -p $password ssh -o StrictHostKeyChecking=no -k $username@$host\ 71 proc get_host_name_servers {host username password {quiet 1}} { 83 # password The host password. 88 lassign [cmd_fnc "sshpass -p $password ssh -o StrictHostKeyChecking=no -k\ 97 proc get_host_mac_address {host username password {interface {}} {quiet 1}} { 111 # password The host password. 119 $password $quiet] 120 lassign [cmd_fnc "sshpass -p $password ssh -o StrictHostKeyChecking=no -k\ [all …]
|
/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_user_account.robot | 81 #username password role_id enabled 90 #username password role_id enabled 99 #username password role_id enabled 103 Verify Redfish Admin User With Wrong Password 104 [Documentation] Verify Redfish admin user with wrong password. 106 [Template] Verify Redfish User with Wrong Password 108 #username password role_id enabled wrong_password 112 Verify Redfish Operator User with Wrong Password 113 [Documentation] Verify Redfish operator user with wrong password. 115 [Template] Verify Redfish User with Wrong Password [all …]
|
H A D | test_ipmi_redfish_user.robot | 35 ... UserName=${random_username} Password=${valid_password} 40 # Delay added for created new user password to get set. 43 Verify IPMI Username And Password ${random_username} ${valid_password} 46 Update User Password Via Redfish And Verify Using IPMI 47 [Documentation] Update user password via Redfish and verify using IPMI. 55 ... UserName=${random_username} Password=${valid_password} 60 # Update user password using Redfish. 61 ${payload}= Create Dictionary Password=${valid_password2} 64 # Verify that IPMI command works with new password and fails with older password. 65 Verify IPMI Username And Password ${random_username} ${valid_password2} [all …]
|
/openbmc/phosphor-webui/app/access-control/controllers/ |
H A D | user-accounts-modal-user.html | 107 <!-- Password --> 109 <label for="password">User password</label> 110 …<p class="label__helper-text">Password must between <span class="nowrap">{{modalCtrl.minPasswordLe… 111 <input id="password" 112 name="password" 113 type="password" 116 autocomplete="new-password" 117 … ng-required="modalCtrl.user.new || form.password.$touched || form.passwordConfirm.$touched" 118 ng-model="modalCtrl.user.password" 119 password-visibility-toggle [all …]
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 293.out | 9 == adding a password to slot 4 == 10 == adding a password to slot 1 == 11 == adding a password to slot 3 == 12 == adding a password to slot 2 == 26 qemu-io: can't open: Invalid password, cannot unlock any keyslot 29 qemu-io: can't open: Invalid password, cannot unlock any keyslot 54 qemu-img: All the active keyslots match the (old) password that was given and erasing them will era… 57 qemu-io: can't open: Invalid password, cannot unlock any keyslot 58 qemu-io: can't open: Invalid password, cannot unlock any keyslot 59 qemu-io: can't open: Invalid password, cannot unlock any keyslot [all …]
|
/openbmc/webui-vue/src/views/ChangePassword/ |
H A D | ChangePassword.vue | 2 <div class="change-password-container"> 16 label-for="password" 19 <input-password-toggle> 21 id="password" 22 v-model="form.password" 24 type="password" 25 :state="getValidationState(v$.form.password)" 27 @change="v$.form.password.$touch()" 31 <template v-if="v$.form.password.required.$invalid"> 35 </input-password-toggle> [all …]
|
/openbmc/openbmc-test-automation/openpower/localuser/ |
H A D | test_ipmi_redfish_user.robot | 50 ... UserName=${random_username} Password=${valid_password} 55 # Add delay for a new admin user password to set. 60 # Update user password using Redfish. 61 ${payload}= Create Dictionary Password=${valid_password2} 64 Verify IPMI Username And Password ${random_username} ${valid_password2} 76 ... UserName=${random_username} Password=${valid_password} 83 # Update user password using Redfish. 84 ${payload}= Create Dictionary Password=${valid_password2} 92 ... Verify IPMI Username And Password ${random_username} ${valid_password2} 95 Update User Password Via Redfish And Verify Using IPMI [all …]
|
/openbmc/webui-vue/src/views/Login/ |
H A D | Login.vue | 35 <label for="password">{{ $t('pageLogin.password') }}</label> 36 <input-password-toggle> 38 id="password" 39 v-model="userInfo.password" 40 aria-describedby="login-error-alert password-required" 41 :state="getValidationState(v$.userInfo.password)" 42 type="password" 43 data-test-id="login-input-password" 45 @input="v$.userInfo.password.$touch()" 48 <b-form-invalid-feedback id="password-required" role="alert"> [all …]
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-class-firmware-attributes | 159 For example a "BIOS Admin" password and "System" Password can be set, 162 - An "Admin" password is used for preventing modification to the BIOS 164 - A "System" password is required to boot a machine. 180 Representing BIOS administrator password 182 Representing a password required to use 185 Representing System Management password. 188 Representing HDD password 191 Representing NVMe password 196 Only supported type currently is "password". 200 maximum length of the Password [all …]
|
/openbmc/phosphor-webui/app/login/controllers/ |
H A D | login-controller.html | 11 <b>Invalid username or password.</b> 15 …__form.host.$pristine" required autofocus ng-keydown="tryLogin(host, username, password, $event)"> 22 …tine" required ng-model="username" ng-keydown="tryLogin(host, username, password, $event)" autocom… 27 <label for="password">Password</label> 28 …password" id="password" name="password" has-error="invalidCredentials && login__form.$pristine" re… 29 …<div ng-messages="login__form.password.$error" class="form-error" ng-class="{'visible': login__for… 33 …e="button" value="Log in" role="button" ng-click="login(host, username, password); submitted = tru…
|
/openbmc/openbmc-test-automation/gui/test/access_control/ |
H A D | test_obmc_gui_local_users.robot | 23 ${xpath_input_password} //input[@id="password"] 89 [Arguments] ${username} ${password} ${privilege}=Administrator 94 # password New user password. 99 Add User Details ${username} ${password} ${privilege} ${account_status} 103 [Arguments] ${username} ${password} ${privilege} ${account_status} 107 # password User password. 115 Input Password ${xpath_input_password} ${password} 116 Input Password ${xpath_confirm_password} ${password} 145 [Arguments] ${username} ${password} ${expected_result}=${True} 149 # password User password. [all …]
|
/openbmc/openbmc/meta-google/recipes-extended/pam/ |
H A D | libpam_%.bbappend | 8 sed -i '/pam_pwquality.so/d' ${D}${sysconfdir}/pam.d/common-password 11 # with "password". This makes sure that if pam_pwquality.so was the first 14 # the user for a new password but use the one provided by the previously 15 # stacked password module". Since there is no "previous" entry, it never 16 # asks for a password which causes the process to fail. 17 awk '/^password/ && !f{sub(/ use_authtok/, ""); f=1} 1' \ 18 ${D}${sysconfdir}/pam.d/common-password \ 19 > ${D}${sysconfdir}/pam.d/common-password.new 20 mv ${D}${sysconfdir}/pam.d/common-password.new \ 21 ${D}${sysconfdir}/pam.d/common-password
|
/openbmc/webui-vue/src/views/SecurityAndAccess/UserManagement/ |
H A D | ModalUser.vue | 130 label-for="password" 132 <b-form-text id="password-help-block"> 140 <input-password-toggle> 142 id="password" 143 v-model="form.password" 144 type="password" 145 data-test-id="userManagement-input-password" 146 aria-describedby="password-help-block" 147 :state="getValidationState(v$.form.password)" 149 @input="v$.form.password.$touch()" [all …]
|
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/ |
H A D | common-password | 2 # /etc/pam.d/common-password - password-related modules common to all services 16 password [success=ok default=die] pam_pwquality.so debug 17 password [success=ok default=die] pam_ipmicheck.so spec_grp_name=ipmi use_authtok 18 password [success=ok ignore=ignore default=die] pam_pwhistory.so debug use_authtok 19 password [success=ok default=die] pam_unix.so sha512 use_authtok 20 password [success=1 default=die] pam_ipmisave.so spec_grp_name=ipmi spec_pass_file=/etc/ipmi_pass … 22 password requisite pam_deny.so 26 password required pam_permit.so
|
/openbmc/phosphor-webui/app/common/directives/password-visibility-toggle/ |
H A D | password-visibility-toggle.js | 5 * Password visibility toggle 8 * from password/text to show/hide the value of a password 12 * <input type="password" password-visibility-toggle /> 25 class="btn btn-tertiary btn-password-toggle" 27 'password-visible': visible, 28 'password-hidden': !visible 38 const type = instanceScope.visible ? 'text' : 'password';
|
/openbmc/ipmitool/lib/ |
H A D | ipmi_user.c | 179 /* _ipmi_set_user_password - Set User Password command. 183 * @operation - which operation to perform(en/disable user, set/test password) 184 * @password - User Password 185 * @is_twenty_byte - 0 = store as 16byte, otherwise store as 20byte password 191 uint8_t operation, const char *password, in _ipmi_set_user_password() argument 206 if (password != NULL) { in _ipmi_set_user_password() 207 size_t copy_len = strlen(password); in _ipmi_set_user_password() 213 strncpy((char *)(data + 2), password, copy_len); in _ipmi_set_user_password() 393 * set to test password and interpret result. 397 const char *password, uint8_t is_twenty_byte_password) in ipmi_user_test_password() argument [all …]
|
H A D | ipmi_main.c | 90 /* ipmi_password_file_read - Open file and read password from it 94 * returns pointer to allocated buffer containing password 114 lprintf(LOG_ERR, "Unable to open password file %s", in ipmi_password_file_read() 122 lprintf(LOG_ERR, "Unable to read password from file %s", in ipmi_password_file_read() 226 lprintf(LOG_NOTICE, " -f file Read remote session password from file"); in ipmi_option_usage() 232 lprintf(LOG_NOTICE, " -a Prompt for remote password"); in ipmi_option_usage() 240 …lprintf(LOG_NOTICE, " -A authtype Force use of auth type NONE, PASSWORD, MD2, MD5 or OEM"… in ipmi_option_usage() 241 lprintf(LOG_NOTICE, " -P password Remote session password"); in ipmi_option_usage() 242 lprintf(LOG_NOTICE, " -E Read password from IPMI_PASSWORD environment variable"); in ipmi_option_usage() 287 * Example: ipmi_parse_hex("50415353574F5244") returns 'PASSWORD' [all …]
|