Home
last modified time | relevance | path

Searched refs:Access (Results 1 – 25 of 125) sorted by relevance

12345

/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-flask-cors/
H A DCVE-2024-6221.patch23Access-Control-Request-Headers` request header (usually part of the preflight OPTIONS request) mat…
26 + If True, the response header :http:header:`Access-Control-Allow-Private-Network`
28 + :http:header:`Access-Control-Request-Private-Network` has a value 'true'.
30 + If False, the reponse header :http:header:`Access-Control-Allow-Private-Network`
32 + :http:header:`Access-Control-Request-Private-Network` has a value of 'true'.
34 + If the request header :http:header:`Access-Control-Request-Private-Network` is
36 + :http:header:`Access-Control-Allow-Private-Network` will not be set.
92 + If True, the response header `Access-Control-Allow-Private-Network`
94 + `Access-Control-Request-Private-Network` has a value 'true'.
96 + If False, the reponse header `Access-Control-Allow-Private-Network`
[all …]
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-requests-toolbelt/
H A D720240501dca0b4eacc3295665d7ced8719e11d2.patch53 - "Access-Control-Allow-Credentials": "true",
54 - "Access-Control-Allow-Origin": "*",
61 + "Access-Control-Allow-Credentials": [
64 + "Access-Control-Allow-Origin": [
123 - "Access-Control-Allow-Credentials": "true",
124 - "Access-Control-Allow-Origin": "*",
131 + "Access-Control-Allow-Credentials": [
134 + "Access-Control-Allow-Origin": [
193 - "Access-Control-Allow-Credentials": "true",
194 - "Access-Control-Allow-Origin": "*",
[all …]
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/Console/
H A Dmeson.build2 subdir('Access') subdir
10 '../../../../yaml/xyz/openbmc_project/Console/Access.interface.yaml',
12 output: ['Access.md'],
24 'xyz/openbmc_project/Console/Access',
/openbmc/phosphor-dbus-interfaces/gen/org/open_power/Host/Access/
H A Dmeson.build3 sdbusplus_current_path = 'org/open_power/Host/Access'
7 input: ['../../../../../yaml/org/open_power/Host/Access.errors.yaml'],
20 'org/open_power/Host/Access',
/openbmc/phosphor-dbus-interfaces/gen/org/open_power/Host/
H A Dmeson.build2 subdir('Access') subdir
31 input: ['../../../../yaml/org/open_power/Host/Access.errors.yaml'],
32 output: ['Access.md'],
44 'org/open_power/Host/Access',
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/Console/Access/
H A Dmeson.build3 sdbusplus_current_path = 'xyz/openbmc_project/Console/Access'
8 '../../../../../yaml/xyz/openbmc_project/Console/Access.interface.yaml',
28 'xyz/openbmc_project/Console/Access',
/openbmc/openbmc-test-automation/ipmi/
H A Dtest_ipmi_payload.robot92 Verify Set User Access Payload For Standard Payload SOL
95 [Teardown] Run Keywords Set User Access Payload For Given User ${user_id_in_hex}
104 …${default_user_access_payload}= Get User Access Payload For Given Channel ${userid_in_hex_format}
107 Set User Access Payload For Given User ${user_id_in_hex} Disable
112 Verify Set User Access Payload For Operator Privileged User
126 Verify Set User Access Payload For Invalid User
139 Verify Set User Access Payload For Invalid Channel Number
148 Verify Set User Access Payload For Invalid Channel ${userid} ${channel}
152 Verify Get User Access Payload For User Access privilege
166 Verify Get User Access Payload For Invalid User
[all …]
H A Dtest_ipmi_user.robot79 Set Channel Access ${random_userid} ipmi=on privilege=${admin_level_priv}
81 ${users_access}= Get User Access Ipmi ${CHANNEL_NUMBER}
201 Set Channel Access ${random_userid} ipmi=on privilege=${admin_level_priv}
299 Set Channel Access ${random_userid} ipmi=on privilege=${admin_level_priv}
324 Set Channel Access ${random_userid} ipmi=on privilege=${admin_level_priv}
375 Set Channel Access ${random_userid} ipmi=on privilege=${admin_level_priv} ${CHANNEL_NUMBER}
378 … Set Channel Access ${random_userid} ipmi=on privilege=${user_priv} ${secondary_channel_number}
406 Set Channel Access ${random_userid} ipmi=on privilege=${operator_priv} ${CHANNEL_NUMBER}
409 … Set Channel Access ${random_userid} ipmi=on privilege=${user_priv} ${secondary_channel_number}
501 Set Channel Access ${random_userid} ipmi=on privilege=${admin_level_priv}
[all …]
/openbmc/openbmc/meta-quanta/meta-gbs/recipes-phosphor/ipmi/phosphor-ipmi-host/
H A Dgbs-ipmid-whitelist.conf33 0x06:0x40 //<App>:<Set Channel Access>
34 0x06:0x41 //<App>:<Get Channel Access>
36 0x06:0x43 //<App>:<Set User Access>
37 0x06:0x44 //<App>:<Get User Access>
/openbmc/openbmc/meta-openembedded/meta-oe/dynamic-layers/meta-python/recipes-dbs/mongodb/mongodb/
H A D0001-Fix-compilation-with-fno-common.patch59 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so.
89 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so.
138 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so.
151 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so.
163 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so.
195 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so.
224 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so.
253 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so.
309 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so.
342 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so.
[all …]
/openbmc/openbmc-test-automation/redfish/dmtf_tools/
H A Dtest_redfishtool_local_user.robot63 Redfishtool Access Resource /redfish/v1/AccountService/Accounts "UserT100" "TestPwd123"
95 Redfishtool Access Resource /redfish/v1/Systems/ "UserT100" "TestPwd123"
108 Redfishtool Access Resource /redfish/v1/Systems/ "UserT100" "TestPwd123"
137 Redfishtool Access Resource /redfish/v1/AccountService/Accounts "UserT100" "TestPwd123"
147 … Redfishtool Access Resource /redfish/v1/Systems/ "UserT100" "TestPwd234" ${HTTP_UNAUTHORIZED}
152 Redfishtool Access Resource
153 [Documentation] Access resource.
/openbmc/phosphor-host-ipmid/docs/
H A Doem-extension-numbering.md71 | 1 | gpioCmd | GPIO Access |
72 | 2 | i2cCmd | I2C Device Access |
73 | 3 | flashCmd | Flash Device Access |
77 ## I2C Device Access (Command 2)
80 Device Access extension OpenBMC OEM extension (command code 2).
/openbmc/openbmc-test-automation/openpower/localuser/
H A Dtest_ipmi_redfish_user.robot56 Enable IPMI Access To User Using Redfish ${random_username}
79 Enable IPMI Access To User Using Redfish ${random_username}
107 Enable IPMI Access To User Using Redfish ${random_username}
134 Enable IPMI Access To User Using Redfish ${random_username}
188 Set Channel Access ${random_userid} ipmi=on privilege=${privilege}
210 Enable IPMI Access To User Using Redfish
/openbmc/openbmc/poky/meta/files/common-licenses/
H A DCAL-1.0-Combined-Work-Exception107 ### 4.1. Provide Access to Source Code
111 Source Code corresponding to the Work ("Access").
120 #### 4.1.1. Providing Network Access to the Source Code
122 Network Access to the Notices and Source Code may be provided by You
131 Recipient of a Modified Work Access to Source Code corresponding to
160 + d) Access to the Source Code pertaining to the modification is
165 In addition to providing each Recipient the opportunity to have Access
187 #### 4.2.2. No Technical Measures that Limit Access
197 #### 4.2.3. No Legal or Contractual Measures that Limit Access
213 Access to Source Code.
[all …]
H A DCAL-1.0107 ### 4.1. Provide Access to Source Code
111 Source Code corresponding to the Work ("Access").
120 #### 4.1.1. Providing Network Access to the Source Code
122 Network Access to the Notices and Source Code may be provided by You
131 Recipient of a Modified Work Access to Source Code corresponding to
160 + d) Access to the Source Code pertaining to the modification is
165 In addition to providing each Recipient the opportunity to have Access
187 #### 4.2.2. No Technical Measures that Limit Access
197 #### 4.2.3. No Legal or Contractual Measures that Limit Access
213 Access to Source Code.
[all …]
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-protocols/rp-pppoe/rp-pppoe/
H A Dpppoe-server.default21 # Access concentrator name, default is the hostname
/openbmc/openbmc/meta-openembedded/meta-multimedia/recipes-dvb/oscam/
H A Doscam_1.20.bb1 SUMMARY = "OSCam: Open Source Conditional Access Module"
/openbmc/u-boot/drivers/ddr/fsl/
H A DKconfig16 Access DDR registers in big-endian
21 Access DDR registers in little-endian
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/tomoyo-tools/
H A Dtomoyo-tools_2.6.1.bb2 DESCRIPTION = "TOMOYO Linux is a Mandatory Access Control (MAC) implementation \
/openbmc/openbmc/poky/meta/recipes-devtools/python/
H A Dpython3-git_3.1.43.bb3 a git repository. Access repository information conveniently, alter the \
/openbmc/ipmitool/src/plugins/imb/
H A Dimbapi.h198 #define CTL_CODE(DeviceType, Function, Method, Access)\ argument
201 #define CTL_CODE( DeviceType, Function, Method, Access ) ((ULONG)( \ argument
202 …((ULONG)(DeviceType) << 16) | ((ULONG)(Access) << 14) | ((ULONG)(Function) << 2) | ((ULONG)Method)…
/openbmc/openbmc/meta-openembedded/meta-python/recipes-networking/python/
H A Dpython3-ldap_3.4.4.bb3 (Lightweight Directory Access Protocol) through Python operations \
/openbmc/openbmc/meta-security/recipes-mac/ccs-tools/
H A Dccs-tools_1.8.9.bb2 DESCRIPTION = "TOMOYO Linux is a Mandatory Access Control (MAC) implementation for Linux that can b…
/openbmc/openbmc/meta-evb/meta-evb-arm/meta-evb-fvp-base/
H A DREADME.md120 #### Host Serial Console Access (via WebUI)
123 2. Log-in to BMC webui (Access via `https://127.0.0.1:4223` or `https://<BMC_IP>`).
126 #### Host Serial Console Access (via IPMI)
132 #### Host Serial Console Access (via SSH)
/openbmc/openbmc/meta-openembedded/meta-gnome/recipes-gnome/gnome-photos/
H A Dgnome-photos_44.0.bb1 SUMMARY = "Access, organize and share your photos on GNOME"

12345