/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-requests-toolbelt/ |
H A D | 720240501dca0b4eacc3295665d7ced8719e11d2.patch | 53 - "Access-Control-Allow-Credentials": "true", 54 - "Access-Control-Allow-Origin": "*", 61 + "Access-Control-Allow-Credentials": [ 64 + "Access-Control-Allow-Origin": [ 123 - "Access-Control-Allow-Credentials": "true", 124 - "Access-Control-Allow-Origin": "*", 131 + "Access-Control-Allow-Credentials": [ 134 + "Access-Control-Allow-Origin": [ 193 - "Access-Control-Allow-Credentials": "true", 194 - "Access-Control-Allow-Origin": "*", [all …]
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-flask-cors/ |
H A D | CVE-2024-6221.patch | 23 …Access-Control-Request-Headers` request header (usually part of the preflight OPTIONS request) mat… 26 + If True, the response header :http:header:`Access-Control-Allow-Private-Network` 28 + :http:header:`Access-Control-Request-Private-Network` has a value 'true'. 30 + If False, the reponse header :http:header:`Access-Control-Allow-Private-Network` 32 + :http:header:`Access-Control-Request-Private-Network` has a value of 'true'. 34 + If the request header :http:header:`Access-Control-Request-Private-Network` is 36 + :http:header:`Access-Control-Allow-Private-Network` will not be set. 92 + If True, the response header `Access-Control-Allow-Private-Network` 94 + `Access-Control-Request-Private-Network` has a value 'true'. 96 + If False, the reponse header `Access-Control-Allow-Private-Network` [all …]
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-class-power | 9 Access: Read 18 Access: Read 27 Access: Read 36 Access: Read 58 Access: Read 76 Access: Read 89 Access: Read 98 Access: Read, Write 118 Access: Read 142 Access: Read [all …]
|
H A D | sysfs-class-power-ltc4162l | 7 Access: Read 25 Access: Read 35 Access: Read 45 Access: Read 61 Access: Read, Write 80 Access: Read, Write
|
H A D | sysfs-driver-input-exc3000 | 6 Access: Read 15 Access: Read 24 Access: Read
|
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/Console/ |
H A D | meson.build | 2 subdir('Access') subdir 10 '../../../../yaml/xyz/openbmc_project/Console/Access.interface.yaml', 12 output: ['Access.md'], 24 'xyz/openbmc_project/Console/Access',
|
/openbmc/phosphor-dbus-interfaces/gen/org/open_power/Host/ |
H A D | meson.build | 2 subdir('Access') subdir 31 input: ['../../../../yaml/org/open_power/Host/Access.errors.yaml'], 32 output: ['Access.md'], 44 'org/open_power/Host/Access',
|
/openbmc/phosphor-dbus-interfaces/gen/org/open_power/Host/Access/ |
H A D | meson.build | 3 sdbusplus_current_path = 'org/open_power/Host/Access' 7 input: ['../../../../../yaml/org/open_power/Host/Access.errors.yaml'], 20 'org/open_power/Host/Access',
|
/openbmc/openbmc-test-automation/ipmi/ |
H A D | test_ipmi_payload.robot | 93 Verify Set User Access Payload For Standard Payload SOL 96 [Teardown] Run Keywords Set User Access Payload For Given User ${user_id_in_hex} 105 …${default_user_access_payload}= Get User Access Payload For Given Channel ${userid_in_hex_format} 108 Set User Access Payload For Given User ${user_id_in_hex} Disable 113 Verify Set User Access Payload For Operator Privileged User 127 Verify Set User Access Payload For Invalid User 140 Verify Set User Access Payload For Invalid Channel Number 149 Verify Set User Access Payload For Invalid Channel ${userid} ${channel} 153 Verify Get User Access Payload For User Access privilege 167 Verify Get User Access Payload For Invalid User [all …]
|
/openbmc/linux/Documentation/sound/cards/ |
H A D | hdspm.rst | 125 * Access -- Read Write 141 * Access -- Read Write 159 * Access -- Read Write 178 * Access -- Read Write 195 * Access -- Read Write 207 * Access -- Read Write 220 * Access -- Read Write 235 * Access -- Read Write 255 * Access -- Read Write 270 * Access -- Read-only [all …]
|
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/Console/Access/ |
H A D | meson.build | 3 sdbusplus_current_path = 'xyz/openbmc_project/Console/Access' 8 '../../../../../yaml/xyz/openbmc_project/Console/Access.interface.yaml', 28 'xyz/openbmc_project/Console/Access',
|
/openbmc/linux/fs/9p/ |
H A D | Kconfig | 24 bool "9P POSIX Access Control Lists" 27 POSIX Access Control Lists (ACLs) support permissions for users and 30 If you don't know what Access Control Lists are, say N
|
/openbmc/linux/fs/ext2/ |
H A D | Kconfig | 25 bool "Ext2 POSIX Access Control Lists" 29 Posix Access Control Lists (ACLs) support permissions for users and 32 If you don't know what Access Control Lists are, say N
|
/openbmc/openbmc/meta-quanta/meta-gbs/recipes-phosphor/ipmi/phosphor-ipmi-host/ |
H A D | gbs-ipmid-whitelist.conf | 33 0x06:0x40 //<App>:<Set Channel Access> 34 0x06:0x41 //<App>:<Get Channel Access> 36 0x06:0x43 //<App>:<Set User Access> 37 0x06:0x44 //<App>:<Get User Access>
|
/openbmc/linux/fs/ceph/ |
H A D | Kconfig | 33 bool "Ceph POSIX Access Control Lists" 37 POSIX Access Control Lists (ACLs) support permissions for users and 40 If you don't know what Access Control Lists are, say N
|
/openbmc/linux/fs/jfs/ |
H A D | Kconfig | 16 bool "JFS POSIX Access Control Lists" 20 Posix Access Control Lists (ACLs) support permissions for users and 23 If you don't know what Access Control Lists are, say N
|
/openbmc/linux/fs/ntfs3/ |
H A D | Kconfig | 38 bool "NTFS POSIX Access Control Lists" 42 POSIX Access Control Lists (ACLs) support additional access rights 48 If you don't know what Access Control Lists are, say N.
|
/openbmc/openbmc/meta-openembedded/meta-oe/dynamic-layers/meta-python/recipes-dbs/mongodb/mongodb/ |
H A D | 0001-Fix-compilation-with-fno-common.patch | 59 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so. 89 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so. 138 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so. 151 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so. 163 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so. 195 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so. 224 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so. 253 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so. 309 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so. 342 + // Access the `_U_dyn_info_list` from `LOCAL_ONLY` library, i.e. libunwind.so. [all …]
|
/openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
H A D | test_redfishtool_local_user.robot | 63 Redfishtool Access Resource /redfish/v1/AccountService/Accounts "UserT100" "TestPwd123" 95 Redfishtool Access Resource /redfish/v1/Systems/ "UserT100" "TestPwd123" 108 Redfishtool Access Resource /redfish/v1/Systems/ "UserT100" "TestPwd123" 137 Redfishtool Access Resource /redfish/v1/AccountService/Accounts "UserT100" "TestPwd123" 147 … Redfishtool Access Resource /redfish/v1/Systems/ "UserT100" "TestPwd234" ${HTTP_UNAUTHORIZED} 152 Redfishtool Access Resource 153 [Documentation] Access resource.
|
/openbmc/linux/Documentation/admin-guide/media/ |
H A D | ci.rst | 3 Digital TV Conditional Access Interface 19 (Common Interface, that holds the CAM (Conditional Access Module) 29 descrambling related information to the Conditional Access Module (CAM).
|
/openbmc/openbmc-test-automation/openpower/localuser/ |
H A D | test_ipmi_redfish_user.robot | 58 Enable IPMI Access To User Using Redfish ${random_username} 81 Enable IPMI Access To User Using Redfish ${random_username} 109 Enable IPMI Access To User Using Redfish ${random_username} 136 Enable IPMI Access To User Using Redfish ${random_username} 190 ... Set Channel Access ${random_userid} ipmi=on privilege=${privilege} 211 Enable IPMI Access To User Using Redfish
|
/openbmc/phosphor-host-ipmid/docs/ |
H A D | oem-extension-numbering.md | 71 | 1 | gpioCmd | GPIO Access | 72 | 2 | i2cCmd | I2C Device Access | 73 | 3 | flashCmd | Flash Device Access | 77 ## I2C Device Access (Command 2) 80 Device Access extension OpenBMC OEM extension (command code 2).
|
/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | CAL-1.0-Combined-Work-Exception | 107 ### 4.1. Provide Access to Source Code 111 Source Code corresponding to the Work ("Access"). 120 #### 4.1.1. Providing Network Access to the Source Code 122 Network Access to the Notices and Source Code may be provided by You 131 Recipient of a Modified Work Access to Source Code corresponding to 160 + d) Access to the Source Code pertaining to the modification is 165 In addition to providing each Recipient the opportunity to have Access 187 #### 4.2.2. No Technical Measures that Limit Access 197 #### 4.2.3. No Legal or Contractual Measures that Limit Access 213 Access to Source Code. [all …]
|
H A D | CAL-1.0 | 107 ### 4.1. Provide Access to Source Code 111 Source Code corresponding to the Work ("Access"). 120 #### 4.1.1. Providing Network Access to the Source Code 122 Network Access to the Notices and Source Code may be provided by You 131 Recipient of a Modified Work Access to Source Code corresponding to 160 + d) Access to the Source Code pertaining to the modification is 165 In addition to providing each Recipient the opportunity to have Access 187 #### 4.2.2. No Technical Measures that Limit Access 197 #### 4.2.3. No Legal or Contractual Measures that Limit Access 213 Access to Source Code. [all …]
|
/openbmc/linux/fs/ext4/ |
H A D | Kconfig | 13 bool "Ext3 POSIX Access Control Lists" 75 bool "Ext4 POSIX Access Control Lists" 79 POSIX Access Control Lists (ACLs) support permissions for users and 82 If you don't know what Access Control Lists are, say N
|