Home
last modified time | relevance | path

Searched refs:Access (Results 1 – 25 of 361) sorted by relevance

12345678910>>...15

/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-requests-toolbelt/
H A D720240501dca0b4eacc3295665d7ced8719e11d2.patch53 - "Access-Control-Allow-Credentials": "true",
54 - "Access-Control-Allow-Origin": "*",
61 + "Access-Control-Allow-Credentials": [
64 + "Access-Control-Allow-Origin": [
123 - "Access-Control-Allow-Credentials": "true",
124 - "Access-Control-Allow-Origin": "*",
131 + "Access-Control-Allow-Credentials": [
134 + "Access-Control-Allow-Origin": [
193 - "Access-Control-Allow-Credentials": "true",
194 - "Access-Control-Allow-Origin": "*",
[all …]
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-flask-cors/
H A DCVE-2024-6221.patch23Access-Control-Request-Headers` request header (usually part of the preflight OPTIONS request) mat…
26 + If True, the response header :http:header:`Access-Control-Allow-Private-Network`
28 + :http:header:`Access-Control-Request-Private-Network` has a value 'true'.
30 + If False, the reponse header :http:header:`Access-Control-Allow-Private-Network`
32 + :http:header:`Access-Control-Request-Private-Network` has a value of 'true'.
34 + If the request header :http:header:`Access-Control-Request-Private-Network` is
36 + :http:header:`Access-Control-Allow-Private-Network` will not be set.
92 + If True, the response header `Access-Control-Allow-Private-Network`
94 + `Access-Control-Request-Private-Network` has a value 'true'.
96 + If False, the reponse header `Access-Control-Allow-Private-Network`
[all …]
/openbmc/linux/Documentation/ABI/testing/
H A Dsysfs-class-power9 Access: Read
18 Access: Read
27 Access: Read
36 Access: Read
58 Access: Read
76 Access: Read
89 Access: Read
98 Access: Read, Write
118 Access: Read
142 Access: Read
[all …]
H A Dsysfs-class-power-ltc4162l7 Access: Read
25 Access: Read
35 Access: Read
45 Access: Read
61 Access: Read, Write
80 Access: Read, Write
H A Dsysfs-driver-input-exc30006 Access: Read
15 Access: Read
24 Access: Read
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/Console/
H A Dmeson.build2 subdir('Access') subdir
10 '../../../../yaml/xyz/openbmc_project/Console/Access.interface.yaml',
12 output: ['Access.md'],
24 'xyz/openbmc_project/Console/Access',
/openbmc/phosphor-dbus-interfaces/gen/org/open_power/Host/
H A Dmeson.build2 subdir('Access') subdir
31 input: ['../../../../yaml/org/open_power/Host/Access.errors.yaml'],
32 output: ['Access.md'],
44 'org/open_power/Host/Access',
/openbmc/phosphor-dbus-interfaces/gen/org/open_power/Host/Access/
H A Dmeson.build3 sdbusplus_current_path = 'org/open_power/Host/Access'
7 input: ['../../../../../yaml/org/open_power/Host/Access.errors.yaml'],
20 'org/open_power/Host/Access',
/openbmc/openbmc-test-automation/ipmi/
H A Dtest_ipmi_payload.robot93 Verify Set User Access Payload For Standard Payload SOL
96 [Teardown] Run Keywords Set User Access Payload For Given User ${user_id_in_hex}
105 …${default_user_access_payload}= Get User Access Payload For Given Channel ${userid_in_hex_format}
108 Set User Access Payload For Given User ${user_id_in_hex} Disable
113 Verify Set User Access Payload For Operator Privileged User
127 Verify Set User Access Payload For Invalid User
140 Verify Set User Access Payload For Invalid Channel Number
149 Verify Set User Access Payload For Invalid Channel ${userid} ${channel}
153 Verify Get User Access Payload For User Access privilege
167 Verify Get User Access Payload For Invalid User
[all …]
/openbmc/linux/Documentation/sound/cards/
H A Dhdspm.rst125 * Access -- Read Write
141 * Access -- Read Write
159 * Access -- Read Write
178 * Access -- Read Write
195 * Access -- Read Write
207 * Access -- Read Write
220 * Access -- Read Write
235 * Access -- Read Write
255 * Access -- Read Write
270 * Access -- Read-only
[all …]
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/Console/Access/
H A Dmeson.build3 sdbusplus_current_path = 'xyz/openbmc_project/Console/Access'
8 '../../../../../yaml/xyz/openbmc_project/Console/Access.interface.yaml',
28 'xyz/openbmc_project/Console/Access',
/openbmc/linux/fs/9p/
H A DKconfig24 bool "9P POSIX Access Control Lists"
27 POSIX Access Control Lists (ACLs) support permissions for users and
30 If you don't know what Access Control Lists are, say N
/openbmc/linux/fs/ext2/
H A DKconfig25 bool "Ext2 POSIX Access Control Lists"
29 Posix Access Control Lists (ACLs) support permissions for users and
32 If you don't know what Access Control Lists are, say N
/openbmc/openbmc/meta-quanta/meta-gbs/recipes-phosphor/ipmi/phosphor-ipmi-host/
H A Dgbs-ipmid-whitelist.conf33 0x06:0x40 //<App>:<Set Channel Access>
34 0x06:0x41 //<App>:<Get Channel Access>
36 0x06:0x43 //<App>:<Set User Access>
37 0x06:0x44 //<App>:<Get User Access>
/openbmc/linux/fs/ceph/
H A DKconfig33 bool "Ceph POSIX Access Control Lists"
37 POSIX Access Control Lists (ACLs) support permissions for users and
40 If you don't know what Access Control Lists are, say N
/openbmc/linux/fs/jfs/
H A DKconfig16 bool "JFS POSIX Access Control Lists"
20 Posix Access Control Lists (ACLs) support permissions for users and
23 If you don't know what Access Control Lists are, say N
/openbmc/linux/fs/ntfs3/
H A DKconfig38 bool "NTFS POSIX Access Control Lists"
42 POSIX Access Control Lists (ACLs) support additional access rights
48 If you don't know what Access Control Lists are, say N.
/openbmc/openbmc/meta-openembedded/meta-oe/dynamic-layers/meta-python/recipes-dbs/mongodb/mongodb/
H A D0001-Fix-compilation-with-fno-common.patch59 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so.
89 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so.
138 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so.
151 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so.
163 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so.
195 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so.
224 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so.
253 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so.
309 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so.
342 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so.
[all …]
/openbmc/openbmc-test-automation/redfish/dmtf_tools/
H A Dtest_redfishtool_local_user.robot63 Redfishtool Access Resource /redfish/v1/AccountService/Accounts "UserT100" "TestPwd123"
95 Redfishtool Access Resource /redfish/v1/Systems/ "UserT100" "TestPwd123"
108 Redfishtool Access Resource /redfish/v1/Systems/ "UserT100" "TestPwd123"
137 Redfishtool Access Resource /redfish/v1/AccountService/Accounts "UserT100" "TestPwd123"
147 … Redfishtool Access Resource /redfish/v1/Systems/ "UserT100" "TestPwd234" ${HTTP_UNAUTHORIZED}
152 Redfishtool Access Resource
153 [Documentation] Access resource.
/openbmc/linux/Documentation/admin-guide/media/
H A Dci.rst3 Digital TV Conditional Access Interface
19 (Common Interface, that holds the CAM (Conditional Access Module)
29 descrambling related information to the Conditional Access Module (CAM).
/openbmc/openbmc-test-automation/openpower/localuser/
H A Dtest_ipmi_redfish_user.robot58 Enable IPMI Access To User Using Redfish ${random_username}
81 Enable IPMI Access To User Using Redfish ${random_username}
109 Enable IPMI Access To User Using Redfish ${random_username}
136 Enable IPMI Access To User Using Redfish ${random_username}
190 ... Set Channel Access ${random_userid} ipmi=on privilege=${privilege}
211 Enable IPMI Access To User Using Redfish
/openbmc/phosphor-host-ipmid/docs/
H A Doem-extension-numbering.md71 | 1 | gpioCmd | GPIO Access |
72 | 2 | i2cCmd | I2C Device Access |
73 | 3 | flashCmd | Flash Device Access |
77 ## I2C Device Access (Command 2)
80 Device Access extension OpenBMC OEM extension (command code 2).
/openbmc/openbmc/poky/meta/files/common-licenses/
H A DCAL-1.0-Combined-Work-Exception107 ### 4.1. Provide Access to Source Code
111 Source Code corresponding to the Work ("Access").
120 #### 4.1.1. Providing Network Access to the Source Code
122 Network Access to the Notices and Source Code may be provided by You
131 Recipient of a Modified Work Access to Source Code corresponding to
160 + d) Access to the Source Code pertaining to the modification is
165 In addition to providing each Recipient the opportunity to have Access
187 #### 4.2.2. No Technical Measures that Limit Access
197 #### 4.2.3. No Legal or Contractual Measures that Limit Access
213 Access to Source Code.
[all …]
H A DCAL-1.0107 ### 4.1. Provide Access to Source Code
111 Source Code corresponding to the Work ("Access").
120 #### 4.1.1. Providing Network Access to the Source Code
122 Network Access to the Notices and Source Code may be provided by You
131 Recipient of a Modified Work Access to Source Code corresponding to
160 + d) Access to the Source Code pertaining to the modification is
165 In addition to providing each Recipient the opportunity to have Access
187 #### 4.2.2. No Technical Measures that Limit Access
197 #### 4.2.3. No Legal or Contractual Measures that Limit Access
213 Access to Source Code.
[all …]
/openbmc/linux/fs/ext4/
H A DKconfig13 bool "Ext3 POSIX Access Control Lists"
75 bool "Ext4 POSIX Access Control Lists"
79 POSIX Access Control Lists (ACLs) support permissions for users and
82 If you don't know what Access Control Lists are, say N

12345678910>>...15