| /openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-flask-cors/ |
| H A D | CVE-2024-6221.patch | 23 …Access-Control-Request-Headers` request header (usually part of the preflight OPTIONS request) mat… 26 + If True, the response header :http:header:`Access-Control-Allow-Private-Network` 28 + :http:header:`Access-Control-Request-Private-Network` has a value 'true'. 30 + If False, the reponse header :http:header:`Access-Control-Allow-Private-Network` 32 + :http:header:`Access-Control-Request-Private-Network` has a value of 'true'. 34 + If the request header :http:header:`Access-Control-Request-Private-Network` is 36 + :http:header:`Access-Control-Allow-Private-Network` will not be set. 92 + If True, the response header `Access-Control-Allow-Private-Network` 94 + `Access-Control-Request-Private-Network` has a value 'true'. 96 + If False, the reponse header `Access-Control-Allow-Private-Network` [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-requests-toolbelt/ |
| H A D | 720240501dca0b4eacc3295665d7ced8719e11d2.patch | 53 - "Access-Control-Allow-Credentials": "true", 54 - "Access-Control-Allow-Origin": "*", 61 + "Access-Control-Allow-Credentials": [ 64 + "Access-Control-Allow-Origin": [ 123 - "Access-Control-Allow-Credentials": "true", 124 - "Access-Control-Allow-Origin": "*", 131 + "Access-Control-Allow-Credentials": [ 134 + "Access-Control-Allow-Origin": [ 193 - "Access-Control-Allow-Credentials": "true", 194 - "Access-Control-Allow-Origin": "*", [all …]
|
| /openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/Console/ |
| H A D | meson.build | 2 subdir('Access') subdir 10 '../../../../yaml/xyz/openbmc_project/Console/Access.interface.yaml', 12 output: ['Access.md'], 24 'xyz/openbmc_project/Console/Access',
|
| /openbmc/phosphor-dbus-interfaces/gen/org/open_power/Host/Access/ |
| H A D | meson.build | 3 sdbusplus_current_path = 'org/open_power/Host/Access' 7 input: ['../../../../../yaml/org/open_power/Host/Access.errors.yaml'], 20 'org/open_power/Host/Access',
|
| /openbmc/phosphor-dbus-interfaces/gen/org/open_power/Host/ |
| H A D | meson.build | 2 subdir('Access') subdir 31 input: ['../../../../yaml/org/open_power/Host/Access.errors.yaml'], 32 output: ['Access.md'], 44 'org/open_power/Host/Access',
|
| /openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/Console/Access/ |
| H A D | meson.build | 3 sdbusplus_current_path = 'xyz/openbmc_project/Console/Access' 8 '../../../../../yaml/xyz/openbmc_project/Console/Access.interface.yaml', 28 'xyz/openbmc_project/Console/Access',
|
| /openbmc/openbmc-test-automation/ipmi/ |
| H A D | test_ipmi_payload.robot | 92 Verify Set User Access Payload For Standard Payload SOL 95 [Teardown] Run Keywords Set User Access Payload For Given User ${user_id_in_hex} 104 …${default_user_access_payload}= Get User Access Payload For Given Channel ${userid_in_hex_format} 107 Set User Access Payload For Given User ${user_id_in_hex} Disable 112 Verify Set User Access Payload For Operator Privileged User 126 Verify Set User Access Payload For Invalid User 139 Verify Set User Access Payload For Invalid Channel Number 148 Verify Set User Access Payload For Invalid Channel ${userid} ${channel} 152 Verify Get User Access Payload For User Access privilege 166 Verify Get User Access Payload For Invalid User [all …]
|
| H A D | test_ipmi_user.robot | 79 Set Channel Access ${random_userid} ipmi=on privilege=${admin_level_priv} 81 ${users_access}= Get User Access Ipmi ${CHANNEL_NUMBER} 201 Set Channel Access ${random_userid} ipmi=on privilege=${admin_level_priv} 299 Set Channel Access ${random_userid} ipmi=on privilege=${admin_level_priv} 324 Set Channel Access ${random_userid} ipmi=on privilege=${admin_level_priv} 375 Set Channel Access ${random_userid} ipmi=on privilege=${admin_level_priv} ${CHANNEL_NUMBER} 378 … Set Channel Access ${random_userid} ipmi=on privilege=${user_priv} ${secondary_channel_number} 406 Set Channel Access ${random_userid} ipmi=on privilege=${operator_priv} ${CHANNEL_NUMBER} 409 … Set Channel Access ${random_userid} ipmi=on privilege=${user_priv} ${secondary_channel_number} 501 Set Channel Access ${random_userid} ipmi=on privilege=${admin_level_priv} [all …]
|
| /openbmc/openbmc/meta-quanta/meta-gbs/recipes-phosphor/ipmi/phosphor-ipmi-host/ |
| H A D | gbs-ipmid-whitelist.conf | 33 0x06:0x40 //<App>:<Set Channel Access> 34 0x06:0x41 //<App>:<Get Channel Access> 36 0x06:0x43 //<App>:<Set User Access> 37 0x06:0x44 //<App>:<Get User Access>
|
| /openbmc/openbmc/meta-openembedded/meta-oe/dynamic-layers/meta-python/recipes-dbs/mongodb/mongodb/ |
| H A D | 0001-Fix-compilation-with-fno-common.patch | 59 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so. 89 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so. 138 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so. 151 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so. 163 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so. 195 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so. 224 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so. 253 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so. 309 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so. 342 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so. [all …]
|
| /openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
| H A D | test_redfishtool_local_user.robot | 63 Redfishtool Access Resource /redfish/v1/AccountService/Accounts "UserT100" "TestPwd123" 95 Redfishtool Access Resource /redfish/v1/Systems/ "UserT100" "TestPwd123" 108 Redfishtool Access Resource /redfish/v1/Systems/ "UserT100" "TestPwd123" 137 Redfishtool Access Resource /redfish/v1/AccountService/Accounts "UserT100" "TestPwd123" 147 … Redfishtool Access Resource /redfish/v1/Systems/ "UserT100" "TestPwd234" ${HTTP_UNAUTHORIZED} 152 Redfishtool Access Resource 153 [Documentation] Access resource.
|
| /openbmc/phosphor-host-ipmid/docs/ |
| H A D | oem-extension-numbering.md | 71 | 1 | gpioCmd | GPIO Access | 72 | 2 | i2cCmd | I2C Device Access | 73 | 3 | flashCmd | Flash Device Access | 77 ## I2C Device Access (Command 2) 80 Device Access extension OpenBMC OEM extension (command code 2).
|
| /openbmc/openbmc-test-automation/openpower/localuser/ |
| H A D | test_ipmi_redfish_user.robot | 56 Enable IPMI Access To User Using Redfish ${random_username} 79 Enable IPMI Access To User Using Redfish ${random_username} 107 Enable IPMI Access To User Using Redfish ${random_username} 134 Enable IPMI Access To User Using Redfish ${random_username} 188 Set Channel Access ${random_userid} ipmi=on privilege=${privilege} 210 Enable IPMI Access To User Using Redfish
|
| /openbmc/openbmc/poky/meta/files/common-licenses/ |
| H A D | CAL-1.0-Combined-Work-Exception | 107 ### 4.1. Provide Access to Source Code 111 Source Code corresponding to the Work ("Access"). 120 #### 4.1.1. Providing Network Access to the Source Code 122 Network Access to the Notices and Source Code may be provided by You 131 Recipient of a Modified Work Access to Source Code corresponding to 160 + d) Access to the Source Code pertaining to the modification is 165 In addition to providing each Recipient the opportunity to have Access 187 #### 4.2.2. No Technical Measures that Limit Access 197 #### 4.2.3. No Legal or Contractual Measures that Limit Access 213 Access to Source Code. [all …]
|
| H A D | CAL-1.0 | 107 ### 4.1. Provide Access to Source Code 111 Source Code corresponding to the Work ("Access"). 120 #### 4.1.1. Providing Network Access to the Source Code 122 Network Access to the Notices and Source Code may be provided by You 131 Recipient of a Modified Work Access to Source Code corresponding to 160 + d) Access to the Source Code pertaining to the modification is 165 In addition to providing each Recipient the opportunity to have Access 187 #### 4.2.2. No Technical Measures that Limit Access 197 #### 4.2.3. No Legal or Contractual Measures that Limit Access 213 Access to Source Code. [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-networking/recipes-protocols/rp-pppoe/rp-pppoe/ |
| H A D | pppoe-server.default | 21 # Access concentrator name, default is the hostname
|
| /openbmc/openbmc/meta-openembedded/meta-multimedia/recipes-dvb/oscam/ |
| H A D | oscam_1.20.bb | 1 SUMMARY = "OSCam: Open Source Conditional Access Module"
|
| /openbmc/u-boot/drivers/ddr/fsl/ |
| H A D | Kconfig | 16 Access DDR registers in big-endian 21 Access DDR registers in little-endian
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/tomoyo-tools/ |
| H A D | tomoyo-tools_2.6.1.bb | 2 DESCRIPTION = "TOMOYO Linux is a Mandatory Access Control (MAC) implementation \
|
| /openbmc/openbmc/poky/meta/recipes-devtools/python/ |
| H A D | python3-git_3.1.43.bb | 3 a git repository. Access repository information conveniently, alter the \
|
| /openbmc/ipmitool/src/plugins/imb/ |
| H A D | imbapi.h | 198 #define CTL_CODE(DeviceType, Function, Method, Access)\ argument 201 #define CTL_CODE( DeviceType, Function, Method, Access ) ((ULONG)( \ argument 202 …((ULONG)(DeviceType) << 16) | ((ULONG)(Access) << 14) | ((ULONG)(Function) << 2) | ((ULONG)Method)…
|
| /openbmc/openbmc/meta-openembedded/meta-python/recipes-networking/python/ |
| H A D | python3-ldap_3.4.4.bb | 3 (Lightweight Directory Access Protocol) through Python operations \
|
| /openbmc/openbmc/meta-security/recipes-mac/ccs-tools/ |
| H A D | ccs-tools_1.8.9.bb | 2 DESCRIPTION = "TOMOYO Linux is a Mandatory Access Control (MAC) implementation for Linux that can b…
|
| /openbmc/openbmc/meta-evb/meta-evb-arm/meta-evb-fvp-base/ |
| H A D | README.md | 120 #### Host Serial Console Access (via WebUI) 123 2. Log-in to BMC webui (Access via `https://127.0.0.1:4223` or `https://<BMC_IP>`). 126 #### Host Serial Console Access (via IPMI) 132 #### Host Serial Console Access (via SSH)
|
| /openbmc/openbmc/meta-openembedded/meta-gnome/recipes-gnome/gnome-photos/ |
| H A D | gnome-photos_44.0.bb | 1 SUMMARY = "Access, organize and share your photos on GNOME"
|