/openbmc/openbmc-test-automation/openpower/ext_interfaces/ |
H A D | test_client_identifier.robot | 76 Create Session For Non Admin User 79 [Template] Non Admin User To Create Session 140 Create A Non Admin Session With ClientID 160 Verify A Non Admin Session Created With ClientID 196 Non Admin User To Create Session 197 [Documentation] Non Admin user create a session and verify the session is created. 214 …${session_info}= Create A Non Admin Session With ClientID ${client_ids} ${username} ${password} 215 Verify A Non Admin Session Created With ClientID ${client_ids} ${session_info}
|
H A D | test_vmicert_management.robot | 149 Get Concurrent Root Certificate Requests From Multiple Admin Users 164 Get Concurrent CSR Requests From Multiple Admin Users 179 Get Concurrent Corrupted CSR Requests From Multiple Admin Users 211 Get Concurrent Root Certificate Request From Admin And Non Admin Users 227 Get Concurrent Root Certificate Request From Different Non Admin Users 352 Send Concurrent CSR Request From Admin And Non Admin Users And Verify 368 Send Concurrent CSR Request From Non Admin Users And Verify 383 Get Root Certificate And Send Corrupted CSR From Admin CSR Request From Operator Concurrently 400 Get Root Certificate From Operator And Send Corrupted CSR Request And CSR Request From Admin Concur… 417 Get Root Certificate From Operator And Admin Send CSR Request From Admin Concurrently [all …]
|
H A D | test_savearea_management.robot | 218 Non Admin Users Fail To Upload Partition File 221 [Template] Non Admin User To Upload Partition File 227 Non Admin User Delete Non Existence Of Partition File 230 [Template] Non Admin Delete Non Existence Partition File 780 Non Admin User To Upload Partition File 801 Non Admin Delete Non Existence Partition File
|
/openbmc/bmcweb/redfish-core/include/generated/enums/ |
H A D | storage_controller.hpp | 12 Admin, enumerator 27 {NVMeControllerType::Admin, "Admin"},
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-class-firmware-attributes | 159 For example a "BIOS Admin" password and "System" Password can be set, 162 - An "Admin" password is used for preventing modification to the BIOS 217 Note, password management is session specific. If Admin password is set, 229 On Dell, Lenovo and HP systems, if Admin password is set, then all BIOS attributes 231 On Lenovo systems if you change the Admin password the new password is not active until 281 echo "supervisor password" > authentication/Admin/current_password 282 echo "signed certificate" > authentication/Admin/certificate 286 echo "signature" > authentication/Admin/signature 287 echo "signed certificate" > authentication/Admin/certificate 291 echo "signature" > authentication/Admin/signature [all …]
|
/openbmc/openbmc-test-automation/security/ |
H A D | test_bmc_expire_password.robot | 194 Verify Expire And Change Admin User Password Via GUI 221 Expire Admin Password And Check IPMI Access Fails 232 Verify Expire Admin Password And Update Bad Password Length Via Redfish 245 Verify Error While Creating User With Expired Admin Password 248 [Teardown] Restore Default Password For Admin User 261 Verify New Admin Password Persistency After BMC Reboot 265 [Teardown] Restore Default Password For Admin User 278 Expire And Change Admin User Password Via Redfish And Verify 282 [Teardown] Restore Default Password For Admin User 296 Verify Maximum Failed Attempts For Admin User And Check Account Locked [all …]
|
/openbmc/phosphor-host-ipmid/ |
H A D | systemintfcmds.cpp | 157 ipmi::Privilege::Admin, ipmiAppReadEventBuffer); in registerNetFnAppFunctions() 162 ipmi::Privilege::Admin, ipmiAppSetBMCGlobalEnable); in registerNetFnAppFunctions() 171 ipmi::app::cmdGetMessageFlags, ipmi::Privilege::Admin, in registerNetFnAppFunctions()
|
H A D | ipmid-new.cpp | 545 privilege = Privilege::Admin; in executionEntry() 709 realPriv = ipmi::Privilege::Admin; in ipmi_register_callback() 715 realPriv = ipmi::Privilege::Admin; in ipmi_register_callback() 718 realPriv = ipmi::Privilege::Admin; in ipmi_register_callback() 751 ipmi::Privilege::Admin, h); in registerHandler() 778 bus, netFn, lun, cmd, 0, 0, 0, ipmi::Privilege::Admin, 0, 0, in handleLegacyIpmiCommand()
|
H A D | globalhandler.cpp | 51 ipmi::app::cmdColdReset, ipmi::Privilege::Admin, in registerNetFnGlobalFunctions()
|
/openbmc/phosphor-host-ipmid/user_channel/ |
H A D | usercommands.cpp | 646 ipmi::Privilege::Admin, ipmiSetUserAccess); in registerUserIpmiFunctions() 650 ipmi::Privilege::Admin, ipmiGetUserAccess); in registerUserIpmiFunctions() 654 ipmi::Privilege::Admin, ipmiGetUserName); in registerUserIpmiFunctions() 657 ipmi::app::cmdSetUserName, ipmi::Privilege::Admin, in registerUserIpmiFunctions() 662 ipmi::Privilege::Admin, ipmiSetUserPassword); in registerUserIpmiFunctions() 671 ipmi::Privilege::Admin, ipmiSetUserPayloadAccess); in registerUserIpmiFunctions()
|
/openbmc/intel-ipmi-oem/src/ |
H A D | firmware-update.cpp | 1706 ipmi::Privilege::Admin, ipmiGetFwVersionInfo); in registerFirmwareFunctions() 1711 ipmi::Privilege::Admin, ipmiGetFwSecurityVersionInfo); in registerFirmwareFunctions() 1716 ipmi::Privilege::Admin, ipmiGetFwRootCertData); in registerFirmwareFunctions() 1722 ipmi::Privilege::Admin, ipmiFirmwareMaxTransferSize); in registerFirmwareFunctions() 1727 ipmi::Privilege::Admin, ipmiGetBmcExecutionContext); in registerFirmwareFunctions() 1732 ipmi::Privilege::Admin, ipmiGetFwUpdateRandomNumber); in registerFirmwareFunctions() 1737 ipmi::Privilege::Admin, ipmiSetFirmwareUpdateMode); in registerFirmwareFunctions() 1742 ipmi::Privilege::Admin, ipmiExitFirmwareUpdateMode); in registerFirmwareFunctions() 1747 ipmi::Privilege::Admin, in registerFirmwareFunctions() 1753 ipmi::Privilege::Admin, ipmiGetFirmwareUpdateStatus); in registerFirmwareFunctions() [all …]
|
H A D | manufacturingcommands.cpp | 1593 ipmi::Privilege::Admin, ipmi::appMTMGetSignal); in register_mtm_commands() 1597 ipmi::Privilege::Admin, ipmi::appMTMSetSignal); in register_mtm_commands() 1601 ipmi::Privilege::Admin, ipmi::mtmKeepAlive); in register_mtm_commands() 1605 ipmi::Privilege::Admin, ipmi::setManufacturingData); in register_mtm_commands() 1609 ipmi::Privilege::Admin, ipmi::getManufacturingData); in register_mtm_commands() 1613 ipmi::Privilege::Admin, ipmi::setFITcLayout); in register_mtm_commands() 1617 ipmi::Privilege::Admin, ipmi::mtmBMCFeatureControl); in register_mtm_commands() 1621 ipmi::Privilege::Admin, in register_mtm_commands() 1626 ipmi::Privilege::Admin, ipmi::clearCMOS); in register_mtm_commands()
|
H A D | bmccontrolservices.cpp | 206 intel::general::cmdControlBmcServices, Privilege::Admin, in register_netfn_bmc_control_functions()
|
/openbmc/openbmc/meta-security/recipes-ids/suricata/ |
H A D | suricata.inc | 2 SECTION = "security Monitor/Admin"
|
/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_redfish_privilege_registry.robot | 11 Suite Teardown Delete Created Redfish Users Except Default Admin 125 Verify Admin User Privileges Via Redfish 126 [Documentation] Verify Admin user privileges via Redfish. 232 Delete Created Redfish Users Except Default Admin
|
H A D | test_user_account.robot | 31 Verify Redfish Admin User Persistence After Reboot 76 Redfish Create and Verify Admin User 103 Verify Redfish Admin User With Wrong Password 130 Verify Login with Deleted Redfish Admin User 157 Verify Admin User Creation Without Enabling It 337 Verify Admin User Privilege 360 Verify Operator User Role Change Using Admin Privilege User 509 Verify SSH Login Access With Admin User
|
/openbmc/linux/Documentation/networking/device_drivers/ethernet/google/ |
H A D | gve.rst | 41 - Admin Queue 73 - Admin Queue messages and registers are all Big Endian. 77 Admin Queue (AQ) 79 The Admin Queue is a PAGE_SIZE memory block, treated as an array of AQ
|
/openbmc/openbmc/meta-openembedded/meta-webserver/recipes-webadmin/webmin/files/ |
H A D | webmin.service | 2 Description=Webmin Admin Tool
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/librdkafka/ |
H A D | librdkafka_1.8.2.bb | 3 providing Producer, Consumer and Admin clients."
|
/openbmc/fb-ipmi-oem/src/ |
H A D | groupextcommands.cpp | 72 ipmi::Privilege::Admin, ipmiSBMRSendBootProgress); in registerSBMRFunctions()
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-freezegun/ |
H A D | 1777174bb97c0b514033a09b820078b0d117f4a8.patch | 4 Subject: [PATCH] Admin: Support Python 3.13
|
/openbmc/docs/designs/ |
H A D | nmi-dbus-interface.md | 23 Whenever the host is unresponsive/running, Admin needs to trigger an NMI event 60 2. Admin/User can use the Redfish URI ComputerSystem.Reset that allows POST
|
/openbmc/linux/drivers/net/ethernet/marvell/octeontx2/ |
H A D | Kconfig | 10 tristate "Marvell OcteonTX2 RVU Admin Function driver"
|
/openbmc/linux/Documentation/networking/device_drivers/ethernet/amazon/ |
H A D | ena.rst | 15 through an Admin Queue. 26 is advertised by the device via the Admin Queue), a dedicated MSI-X 68 - Admin Queue (AQ) and Admin Completion Queue (ACQ)
|
/openbmc/linux/drivers/block/zram/ |
H A D | Kconfig | 86 of zRAM. Admin could see the information via
|