Home
last modified time | relevance | path

Searched full:password (Results 1 – 25 of 825) sorted by relevance

12345678910>>...33

/openbmc/openbmc-test-automation/security/
H A Dtest_bmc_expire_password.robot2 Documentation Test root user expire password.
28 Expire Root Password And Check IPMI Access Fails
29 [Documentation] Expire root user password and expect an error while access via IPMI.
33 Expire Password ${OPENBMC_USERNAME}
39 Expire Root Password And Check SSH Access Fails
40 [Documentation] Expire root user password and expect an error while access via SSH.
44 Expire Password ${OPENBMC_USERNAME}
51 Expire And Change Root User Password And Access Via SSH
52 [Documentation] Expire and change root user password and access via SSH.
55 ... Restore Default Password For Root User AND FFDC On Test Case Fail
[all …]
/openbmc/docs/designs/
H A Dexpired-password.md11 OpenBMC has a default password, connects to the network via DHCP, and does not
12 have a mechanism to require administrators to change the BMC's password. This
19 password be changed on the initial signon. This reduces the time window when the
20 system is accessible with a default password.
26 1. Success, when the access credentials (such as username and password) are
30 password) may be expired.
32 account is valid except the account's password is expired (such as indicated
38 PasswordChangeRequired by implementing a "password change dialog".
40 The [Redfish Specification version 1.7.0][] section 13.2.6.1 ("Password change
42 PasswordChangeRequired property which supports a password change dialog.
[all …]
H A Destoraged.md17 password.
30 capability, which facilitates password management so that we can do things like
31 change the password without re-encrypting the entire device.
46 - Encryption Password: The password needed to load the volume key into RAM and
48 - Device Password: The password to lock or unlock the device hardware.
58 - Change the password
76 client daemon to provide a password. For example, this password could come from
89 - (method) Change Password
107 library provides functions to create a new LUKS header, set the password, etc.
109 For eMMC devices, we plan to enable the password locking feature (CMD42), to
[all …]
/openbmc/phosphor-webui/app/profile-settings/controllers/
H A Dprofile-settings-controller.html24 <h2 class="section-title">Change password</h2>
27 <!-- Password -->
29 <label for="password">New password</label>
30 …<p class="label__helper-text">Password must between <span class="nowrap">{{minPasswordLength}} – {…
31 <input id="password"
32 name="password"
33 type="password"
37 autocomplete="new-password"
38 ng-model="password"
39 password-visibility-toggle/>
[all …]
H A Dprofile-settings-controller.js19 $scope.password;
23 * Make API call to update user password
24 * @param {string} password
26 const updatePassword = function(password) { argument
28 APIUtils.updateUser($scope.username, null, password)
31 'Password has been updated successfully.'))
34 toastService.error('Unable to update password.')
37 $scope.password = '';
47 * password length requirement
61 const password = form.password.$viewValue;
[all …]
/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/
H A Dshadow-update-pam-conf.patch9 common-password and common-session.
12 See meta/recipes-extended/pam/libpam/pam.d/common-password
37 -password include system-auth
38 +password include common-password
47 -password include system-auth
48 +password include common-password
57 -password include system-auth
58 +password include common-password
67 -password include system-auth
68 +password include common-password
[all …]
/openbmc/openbmc-test-automation/ipmi/
H A Dtest_ipmi_user.robot71 ... user set password ${random_userid} ${valid_password}
129 Verify Setting IPMI User With Invalid Password
131 ... password.
139 # Set invalid password for newly created user.
141 ... user set password ${random_userid} ${invalid_password}
143 # Delay added for user password to get set.
146 Should Contain ${msg} Set User Password command failed
154 # Set invalid password for newly created user.
161 Verify IPMI User Password Via Test Command
162 [Documentation] Verify IPMI user password using test command.
[all …]
/openbmc/bios-settings-mgr/include/
H A Dpassword.hpp25 #include <xyz/openbmc_project/BIOSConfig/Password/server.hpp>
33 "/xyz/openbmc_project/bios_config/password";
40 using Base = sdbusplus::xyz::openbmc_project::BIOSConfig::server::Password;
43 /** @class Password
45 * @brief Implements the BIOS Password
47 class Password : public Base class
50 Password() = delete;
51 ~Password() = default;
52 Password(const Password&) = delete;
53 Password& operator=(const Password&) = delete;
[all …]
/openbmc/openbmc-test-automation/lib/
H A Dhost.tcl46 proc get_host_domain {host username password {quiet 1}} {
58 # password The host password.
64 "sshpass -p $password ssh -o StrictHostKeyChecking=no -k $username@$host\
71 proc get_host_name_servers {host username password {quiet 1}} {
83 # password The host password.
88 lassign [cmd_fnc "sshpass -p $password ssh -o StrictHostKeyChecking=no -k\
97 proc get_host_mac_address {host username password {interface {}} {quiet 1}} {
111 # password The host password.
119 $password $quiet]
120 lassign [cmd_fnc "sshpass -p $password ssh -o StrictHostKeyChecking=no -k\
[all …]
/openbmc/openbmc-test-automation/redfish/account_service/
H A Dtest_user_account.robot81 #username password role_id enabled
90 #username password role_id enabled
99 #username password role_id enabled
103 Verify Redfish Admin User With Wrong Password
104 [Documentation] Verify Redfish admin user with wrong password.
106 [Template] Verify Redfish User with Wrong Password
108 #username password role_id enabled wrong_password
112 Verify Redfish Operator User with Wrong Password
113 [Documentation] Verify Redfish operator user with wrong password.
115 [Template] Verify Redfish User with Wrong Password
[all …]
H A Dtest_ipmi_redfish_user.robot35 ... UserName=${random_username} Password=${valid_password}
40 # Delay added for created new user password to get set.
43 Verify IPMI Username And Password ${random_username} ${valid_password}
46 Update User Password Via Redfish And Verify Using IPMI
47 [Documentation] Update user password via Redfish and verify using IPMI.
55 ... UserName=${random_username} Password=${valid_password}
60 # Update user password using Redfish.
61 ${payload}= Create Dictionary Password=${valid_password2}
64 # Verify that IPMI command works with new password and fails with older password.
65 Verify IPMI Username And Password ${random_username} ${valid_password2}
[all …]
/openbmc/phosphor-webui/app/access-control/controllers/
H A Duser-accounts-modal-user.html107 <!-- Password -->
109 <label for="password">User password</label>
110 …<p class="label__helper-text">Password must between <span class="nowrap">{{modalCtrl.minPasswordLe…
111 <input id="password"
112 name="password"
113 type="password"
116 autocomplete="new-password"
117 … ng-required="modalCtrl.user.new || form.password.$touched || form.passwordConfirm.$touched"
118 ng-model="modalCtrl.user.password"
119 password-visibility-toggle
[all …]
/openbmc/qemu/tests/qemu-iotests/
H A D293.out9 == adding a password to slot 4 ==
10 == adding a password to slot 1 ==
11 == adding a password to slot 3 ==
12 == adding a password to slot 2 ==
26 qemu-io: can't open: Invalid password, cannot unlock any keyslot
29 qemu-io: can't open: Invalid password, cannot unlock any keyslot
54 qemu-img: All the active keyslots match the (old) password that was given and erasing them will era…
57 qemu-io: can't open: Invalid password, cannot unlock any keyslot
58 qemu-io: can't open: Invalid password, cannot unlock any keyslot
59 qemu-io: can't open: Invalid password, cannot unlock any keyslot
[all …]
/openbmc/webui-vue/src/views/ChangePassword/
H A DChangePassword.vue2 <div class="change-password-container">
16 label-for="password"
19 <input-password-toggle>
21 id="password"
22 v-model="form.password"
24 type="password"
25 :state="getValidationState(v$.form.password)"
27 @change="v$.form.password.$touch()"
31 <template v-if="v$.form.password.required.$invalid">
35 </input-password-toggle>
[all …]
/openbmc/openbmc-test-automation/openpower/localuser/
H A Dtest_ipmi_redfish_user.robot50 ... UserName=${random_username} Password=${valid_password}
55 # Add delay for a new admin user password to set.
60 # Update user password using Redfish.
61 ${payload}= Create Dictionary Password=${valid_password2}
64 Verify IPMI Username And Password ${random_username} ${valid_password2}
76 ... UserName=${random_username} Password=${valid_password}
83 # Update user password using Redfish.
84 ${payload}= Create Dictionary Password=${valid_password2}
92 ... Verify IPMI Username And Password ${random_username} ${valid_password2}
95 Update User Password Via Redfish And Verify Using IPMI
[all …]
/openbmc/webui-vue/src/views/Login/
H A DLogin.vue35 <label for="password">{{ $t('pageLogin.password') }}</label>
36 <input-password-toggle>
38 id="password"
39 v-model="userInfo.password"
40 aria-describedby="login-error-alert password-required"
41 :state="getValidationState(v$.userInfo.password)"
42 type="password"
43 data-test-id="login-input-password"
45 @input="v$.userInfo.password.$touch()"
48 <b-form-invalid-feedback id="password-required" role="alert">
[all …]
/openbmc/linux/Documentation/ABI/testing/
H A Dsysfs-class-firmware-attributes159 For example a "BIOS Admin" password and "System" Password can be set,
162 - An "Admin" password is used for preventing modification to the BIOS
164 - A "System" password is required to boot a machine.
180 Representing BIOS administrator password
182 Representing a password required to use
185 Representing System Management password.
188 Representing HDD password
191 Representing NVMe password
196 Only supported type currently is "password".
200 maximum length of the Password
[all …]
/openbmc/phosphor-webui/app/login/controllers/
H A Dlogin-controller.html11 <b>Invalid username or password.</b>
15 …__form.host.$pristine" required autofocus ng-keydown="tryLogin(host, username, password, $event)">
22 …tine" required ng-model="username" ng-keydown="tryLogin(host, username, password, $event)" autocom…
27 <label for="password">Password</label>
28password" id="password" name="password" has-error="invalidCredentials && login__form.$pristine" re…
29 …<div ng-messages="login__form.password.$error" class="form-error" ng-class="{'visible': login__for…
33 …e="button" value="Log in" role="button" ng-click="login(host, username, password); submitted = tru…
/openbmc/openbmc-test-automation/gui/test/access_control/
H A Dtest_obmc_gui_local_users.robot23 ${xpath_input_password} //input[@id="password"]
89 [Arguments] ${username} ${password} ${privilege}=Administrator
94 # password New user password.
99 Add User Details ${username} ${password} ${privilege} ${account_status}
103 [Arguments] ${username} ${password} ${privilege} ${account_status}
107 # password User password.
115 Input Password ${xpath_input_password} ${password}
116 Input Password ${xpath_confirm_password} ${password}
145 [Arguments] ${username} ${password} ${expected_result}=${True}
149 # password User password.
[all …]
/openbmc/openbmc/meta-google/recipes-extended/pam/
H A Dlibpam_%.bbappend8 sed -i '/pam_pwquality.so/d' ${D}${sysconfdir}/pam.d/common-password
11 # with "password". This makes sure that if pam_pwquality.so was the first
14 # the user for a new password but use the one provided by the previously
15 # stacked password module". Since there is no "previous" entry, it never
16 # asks for a password which causes the process to fail.
17 awk '/^password/ && !f{sub(/ use_authtok/, ""); f=1} 1' \
18 ${D}${sysconfdir}/pam.d/common-password \
19 > ${D}${sysconfdir}/pam.d/common-password.new
20 mv ${D}${sysconfdir}/pam.d/common-password.new \
21 ${D}${sysconfdir}/pam.d/common-password
/openbmc/webui-vue/src/views/SecurityAndAccess/UserManagement/
H A DModalUser.vue130 label-for="password"
132 <b-form-text id="password-help-block">
140 <input-password-toggle>
142 id="password"
143 v-model="form.password"
144 type="password"
145 data-test-id="userManagement-input-password"
146 aria-describedby="password-help-block"
147 :state="getValidationState(v$.form.password)"
149 @input="v$.form.password.$touch()"
[all …]
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/
H A Dcommon-password2 # /etc/pam.d/common-password - password-related modules common to all services
16 password [success=ok default=die] pam_pwquality.so debug
17 password [success=ok default=die] pam_ipmicheck.so spec_grp_name=ipmi use_authtok
18 password [success=ok ignore=ignore default=die] pam_pwhistory.so debug use_authtok
19 password [success=ok default=die] pam_unix.so sha512 use_authtok
20 password [success=1 default=die] pam_ipmisave.so spec_grp_name=ipmi spec_pass_file=/etc/ipmi_pass …
22 password requisite pam_deny.so
26 password required pam_permit.so
/openbmc/phosphor-webui/app/common/directives/password-visibility-toggle/
H A Dpassword-visibility-toggle.js5 * Password visibility toggle
8 * from password/text to show/hide the value of a password
12 * <input type="password" password-visibility-toggle />
25 class="btn btn-tertiary btn-password-toggle"
27 'password-visible': visible,
28 'password-hidden': !visible
38 const type = instanceScope.visible ? 'text' : 'password';
/openbmc/ipmitool/lib/
H A Dipmi_user.c179 /* _ipmi_set_user_password - Set User Password command.
183 * @operation - which operation to perform(en/disable user, set/test password)
184 * @password - User Password
185 * @is_twenty_byte - 0 = store as 16byte, otherwise store as 20byte password
191 uint8_t operation, const char *password, in _ipmi_set_user_password() argument
206 if (password != NULL) { in _ipmi_set_user_password()
207 size_t copy_len = strlen(password); in _ipmi_set_user_password()
213 strncpy((char *)(data + 2), password, copy_len); in _ipmi_set_user_password()
393 * set to test password and interpret result.
397 const char *password, uint8_t is_twenty_byte_password) in ipmi_user_test_password() argument
[all …]
H A Dipmi_main.c90 /* ipmi_password_file_read - Open file and read password from it
94 * returns pointer to allocated buffer containing password
114 lprintf(LOG_ERR, "Unable to open password file %s", in ipmi_password_file_read()
122 lprintf(LOG_ERR, "Unable to read password from file %s", in ipmi_password_file_read()
226 lprintf(LOG_NOTICE, " -f file Read remote session password from file"); in ipmi_option_usage()
232 lprintf(LOG_NOTICE, " -a Prompt for remote password"); in ipmi_option_usage()
240 …lprintf(LOG_NOTICE, " -A authtype Force use of auth type NONE, PASSWORD, MD2, MD5 or OEM"… in ipmi_option_usage()
241 lprintf(LOG_NOTICE, " -P password Remote session password"); in ipmi_option_usage()
242 lprintf(LOG_NOTICE, " -E Read password from IPMI_PASSWORD environment variable"); in ipmi_option_usage()
287 * Example: ipmi_parse_hex("50415353574F5244") returns 'PASSWORD'
[all …]

12345678910>>...33