| /openbmc/u-boot/cmd/ |
| H A D | mfsl.c | 41 case 2: GET (num, 0); in do_frd() 57 case 2: GET (num, 1); in do_frd() 73 case 2: GET (num, 2); in do_frd() 89 case 2: GET (num, 3); in do_frd() 105 case 2: GET (num, 4); in do_frd() 121 case 2: GET (num, 5); in do_frd() 137 case 2: GET (num, 6); in do_frd() 153 case 2: GET (num, 7); in do_frd()
|
| /openbmc/phosphor-misc/http-redirect/ |
| H A D | tests | 27 GET http://somewhere.example.com/over/the/rainbow HTTP/1.1 45 GET http://somewhere.example HTTP/1.1 64 GET /over/the/rainbow HTTP/1.1 84 GET /over/the/rainbow HTTP/1.1
|
| /openbmc/openbmc-test-automation/redfish/service_root/ |
| H A D | test_service_root.robot | 22 GET Redfish Hypermedia Without Login 23 [Documentation] GET hypermedia URL without login. 26 [Template] GET And Verify Redfish Response 33 GET Redfish SessionService Without Login 42 GET Redfish Resources With Login 43 [Documentation] Login to BMCweb and GET valid resource. 46 [Template] GET And Verify Redfish Response 67 ${resp} = GET On Session 154 GET And Verify Redfish Response 155 [Documentation] GET given resource and verify response.
|
| /openbmc/openbmc/poky/bitbake/lib/toaster/toastergui/ |
| H A D | widgets.py | 90 if request.GET.get('format', None) == 'json': 97 cmd = request.GET.get('cmd', None) 111 search = request.GET.get("search", None) 115 name = request.GET.get("name", None) 277 page_num = request.GET.get("page", 1) 278 limit = request.GET.get("limit", 10) 279 search = request.GET.get("search", None) 280 filters = request.GET.get("filter", None) 281 filter_value = request.GET.get("filter_value", "on") 282 orderby = request.GET.get("orderby", None) [all …]
|
| H A D | typeaheads.py | 28 if "include_added" in request.GET and \ 29 request.GET['include_added'] != "true": 181 git_url = request.GET.get('git_url')
|
| H A D | views.py | 266 …return "%s:+" % orderkey if request.GET.get('orderby', "") == "%s:-" % orderkey else "%s:-" % orde… 268 …return "%s:-" % orderkey if request.GET.get('orderby', "") == "%s:+" % orderkey else "%s:+" % orde… 271 if request.GET.get('orderby', "") == "%s:+"%orderkey: 273 elif request.GET.get('orderby', "") == "%s:-"%orderkey: 325 ordering_string, invalid = _validate_input(request.GET.get('orderby', ''), model) 329 filter_string, invalid = _validate_input(request.GET.get('filter', ''), model) 333 search_term = request.GET.get('search', '') 367 … pagesize = request.GET.get('count', request.session.get('%s_count' % current_url, default_count)) 368 …orderby = request.GET.get('orderby', request.session.get('%s_orderby' % current_url, default_order… 426 …context_date['last_date_from'] = request.GET.get('last_date_from',timezone.localtime(timezone.now(… [all …]
|
| /openbmc/openbmc-test-automation/extended/ |
| H A D | test_bmc_stress_buster.robot | 59 [Documentation] Execute REST GET operation. 69 # Trigger GET REST enumeration. 70 ${resp}= GET On Session openbmc /redfish/v1/Managers/${MANAGER_ID} expected_status=any 71 Log To Console GET Request /redfish/v1/Managers/${MANAGER_ID}
|
| /openbmc/openbmc-test-automation/security/ |
| H A D | test_bmcweb_security.robot | 19 Check BMCWeb Service After Attempted GET With Invalid URL 20 [Documentation] Request BMC GET with invalid URL.
|
| H A D | test_ssl.robot | 26 Run Keyword And Expect Error *ConnectTimeoutError* GET On Session openbmc /list 34 Run Keyword And Expect Error ConnectionError* GET On Session openbmc /list
|
| /openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-requests-toolbelt/ |
| H A D | 720240501dca0b4eacc3295665d7ced8719e11d2.patch | 47 "method": "GET", 117 "method": "GET", 187 "method": "GET", 257 "method": "GET", 327 "method": "GET", 397 "method": "GET", 468 "method": "GET",
|
| /openbmc/openbmc-test-automation/systest/ |
| H A D | test_bmc_poll_errors.robot | 35 Repeat Keyword ${POLL_DURATION} Perform GET Request And Check For Errors 40 Perform GET Request And Check For Errors
|
| /openbmc/openbmc-test-automation/lib/ |
| H A D | dmtf_redfishtool_utils.robot | 16 [Documentation] Execute redfishtool for GET operation. 20 # uri URI for GET operation (e.g. /redfish/v1/AccountService/Accounts/). 25 ${cmd}= Catenate ${cmd_args} GET ${uri}
|
| /openbmc/phosphor-networkd/docs/ |
| H A D | Network-Configuration.md | 80 curl -c cjar -b cjar -k -H "Content-Type: application/json" -X GET 109 curl -c cjar -b cjar -k -H "Content-Type: application/json" -X GET 150 curl -c cjar -b cjar -k -H "Content-Type: application/json" -X GET 174 curl -c cjar -b cjar -k -H "Content-Type: application/json" -X GET 226 curl -c cjar -b cjar -k -H "Content-Type: application/json" -X GET
|
| /openbmc/openbmc-test-automation/ffdc/docs/ |
| H A D | yaml_syntax_rules.md | 58 # File contains the data returned from 'redfishtool GET URL' 61 …- redfishtool -u ${username} -p ${password} -r ${hostname} -S Always raw GET /redfish/v1/AccountSe…
|
| /openbmc/openbmc-test-automation/lib/pdu/ |
| H A D | synaccess.robot | 18 ${resp}= GET On Session pdu /cmd.cgi?$A4 ${PDU_SLOT_NO}
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-benchmark/lmbench/lmbench/ |
| H A D | 0001-lat_http.c-Add-printf-format.patch | 20 sprintf(buf, "GET /%s HTTP/1.0\r\n\r\n\n", file);
|
| /openbmc/u-boot/arch/microblaze/include/asm/ |
| H A D | asm.h | 12 #define GET(val, fslnum) \ macro
|
| /openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/tinyproxy/tinyproxy/ |
| H A D | CVE-2022-40468.patch | 31 if (ret == 2 && !strcasecmp (request->method, "GET")) {
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/nmap/files/ |
| H A D | 0002-Fix-building-with-libc.patch | 54 - * common strings like "GET / HTTP/1.1\r\n" 55 + * common strings like "GET / HTTP/1.1\r\n"
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/nmap/nmap-7.92/ |
| H A D | 0004-Fix-building-with-libc.patch | 54 - * common strings like "GET / HTTP/1.1\r\n" 55 + * common strings like "GET / HTTP/1.1\r\n"
|
| /openbmc/docs/ |
| H A D | REST-cheatsheet.md | 15 use the same cookie jar files for read-only REST methods like GET, but requires 42 curl -k -X GET https://root:0penBmc@${bmc}/xyz/openbmc_project/list 114 …curl -k -H "X-Auth-Token: $token" -H "Content-Type: application/json" -X GET https://${bmc}/xyz/op… 221 …curl -k -H "X-Auth-Token: $token" -X GET https://${bmc}/xyz/openbmc_project/time/owner/attr/TimeOw… 222 …curl -k -H "X-Auth-Token: $token" -X GET https://${bmc}/xyz/openbmc_project/time/sync_method/attr/… 247 …curl -k -H "X-Auth-Token: $token" -X GET https://${bmc}/xyz/openbmc_project/control/power_supply_r…
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/cli11/cli11/ |
| H A D | 0001-Do-not-download-the-catch-framework-during-configure.patch | 31 - list(GET status 0 error)
|
| /openbmc/openbmc-test-automation/lib/external_intf/ |
| H A D | vmi_utils.robot | 47 # valid_status_code Expected valid status code from GET request. Default is HTTP_ACCEPTED. 76 # valid_status_code Expected valid status code from GET request. Default is HTTP_OK. 136 # valid_status_code Expected valid status code from GET request. 171 # valid_status_code Expected valid status code from GET request. 194 # valid_status_code Expected valid status code from GET request.
|
| /openbmc/openbmc/meta-security/dynamic-layers/meta-perl/recipes-security/nikto/files/ |
| H A D | location.patch | 18 CHECKMETHODS=HEAD GET
|
| /openbmc/docs/designs/ |
| H A D | redfish-eventservice.md | 64 - SSE: BMC shall respond to GET method on URI specific in "ServerSentEventUri" 100 performing a GET on the URI specified by the "ServerSentEventUri" in the 118 CONFIGURATION| |SSE(GET) NETWORK PUSH STYLE | |SSE 518 - METHODS : `GET, PATCH` 529 - METHODS : `GET, POST` 540 - METHODS : `GET, PATCH, DELETE` 742 a client performs a GET on the URI specified by the "ServerSentEventUri", the 745 to GET URI with following headers. 775 Note: since its GET operation on existing open connection(which is authenticated 820 METHOD: GET [all …]
|