| /openbmc/openbmc-test-automation/lib/ |
| H A D | host.tcl | 46 proc get_host_domain {host username password {quiet 1}} { 64 "sshpass -p $password ssh -o StrictHostKeyChecking=no -k $username@$host\ 71 proc get_host_name_servers {host username password {quiet 1}} { 88 lassign [cmd_fnc "sshpass -p $password ssh -o StrictHostKeyChecking=no -k\ 97 proc get_host_mac_address {host username password {interface {}} {quiet 1}} { 119 $password $quiet] 120 lassign [cmd_fnc "sshpass -p $password ssh -o StrictHostKeyChecking=no -k\ 128 proc get_host_gateway {host username password {quiet 1}} { 145 lassign [cmd_fnc "sshpass -p $password ssh -o StrictHostKeyChecking=no -k\ 153 proc get_host_default_interface {host username password {quiet 1} } { [all …]
|
| H A D | redfish_request.robot | 17 [Arguments] ${user_name} ${password} 21 # password Password of BMC. 25 ${data}= Create Dictionary UserName=${user_name} Password=${password} Oem=${oem_data} 36 [Arguments] ${user_name} ${password} 40 # password Password of BMC. 43 ${session_resp}= Redfish Generic Login Request ${user_name} ${password}
|
| /openbmc/openbmc/poky/meta/recipes-extended/shadow/files/ |
| H A D | shadow-update-pam-conf.patch | 9 common-password and common-session. 12 See meta/recipes-extended/pam/libpam/pam.d/common-password 36 -password include system-auth 37 +password include common-password 46 -password include system-auth 47 +password include common-password 56 -password include system-auth 57 +password include common-password 66 -password include system-auth 67 +password include common-password [all …]
|
| /openbmc/webui-vue/src/views/ChangePassword/ |
| H A D | ChangePassword.vue | 2 <div class="change-password-container"> 18 label-for="password" 21 <input-password-toggle> 23 id="password" 24 v-model="form.password" 26 type="password" 27 autocomplete="new-password" 28 :state="getValidationState(v$.form.password)" 30 @change="v$.form.password.$touch()" 34 <template v-if="v$.form.password.required.$invalid"> [all …]
|
| /openbmc/docs/designs/ |
| H A D | expired-password.md | 11 OpenBMC has a default password, connects to the network via DHCP, and does not 12 have a mechanism to require administrators to change the BMC's password. This 19 password be changed on the initial signon. This reduces the time window when the 20 system is accessible with a default password. 26 1. Success, when the access credentials (such as username and password) are 30 password) may be expired. 32 account is valid except the account's password is expired (such as indicated 38 PasswordChangeRequired by implementing a "password change dialog". 42 PasswordChangeRequired property which supports a password change dialog. 47 Note the terminology: An "expired password" is a special case of "password [all …]
|
| /openbmc/webui-vue/src/views/Login/ |
| H A D | Login.vue | 36 <label for="password" class="d-block"> 37 {{ $t('pageLogin.password') }} 39 <input-password-toggle> 41 id="password" 42 v-model="userInfo.password" 43 aria-describedby="login-error-alert password-required" 44 :state="getValidationState(v$.userInfo.password)" 45 type="password" 46 autocomplete="current-password" 47 data-test-id="login-input-password" [all …]
|
| /openbmc/openbmc/meta-google/recipes-extended/pam/ |
| H A D | libpam_%.bbappend | 8 sed -i '/pam_pwquality.so/d' ${D}${sysconfdir}/pam.d/common-password 11 # with "password". This makes sure that if pam_pwquality.so was the first 14 # the user for a new password but use the one provided by the previously 15 # stacked password module". Since there is no "previous" entry, it never 16 # asks for a password which causes the process to fail. 17 awk '/^password/ && !f{sub(/ use_authtok/, ""); f=1} 1' \ 18 ${D}${sysconfdir}/pam.d/common-password \ 19 > ${D}${sysconfdir}/pam.d/common-password.new 20 mv ${D}${sysconfdir}/pam.d/common-password.new \ 21 ${D}${sysconfdir}/pam.d/common-password
|
| /openbmc/phosphor-webui/app/profile-settings/controllers/ |
| H A D | profile-settings-controller.js | 19 $scope.password; 26 const updatePassword = function(password) { argument 28 APIUtils.updateUser($scope.username, null, password) 37 $scope.password = ''; 61 const password = form.password.$viewValue; 62 updatePassword(password);
|
| /openbmc/openbmc-test-automation/security/ |
| H A D | test_bmc_expire_password.robot | 2 Documentation Test root user expire password. 29 [Documentation] Expire root user password and expect an error while access via IPMI. 40 [Documentation] Expire root user password and expect an error while access via SSH. 52 [Documentation] Expire and change root user password and access via SSH. 60 # Change to a valid password. 64 # Verify login with the new password through SSH. 69 [Documentation] Expire root password and update bad password via Redfish and expect an error. 84 [Documentation] Expire and change root user password via Redfish and verify. 93 # Change to a valid password. 98 # Verify login with the new password. [all …]
|
| /openbmc/ipmitool/lib/ |
| H A D | ipmi_main.c | 392 char * password = NULL; in ipmi_main() local 508 if (password) { in ipmi_main() 509 free(password); in ipmi_main() 510 password = NULL; in ipmi_main() 512 password = ipmi_password_file_read(optarg); in ipmi_main() 513 if (password == NULL) in ipmi_main() 524 if (password) { in ipmi_main() 525 free(password); in ipmi_main() 526 password = NULL; in ipmi_main() 528 password = strdup(tmp_pass); in ipmi_main() [all …]
|
| H A D | ipmi_user.c | 191 uint8_t operation, const char *password, in _ipmi_set_user_password() argument 206 if (password != NULL) { in _ipmi_set_user_password() 207 size_t copy_len = strlen(password); in _ipmi_set_user_password() 213 strncpy((char *)(data + 2), password, copy_len); in _ipmi_set_user_password() 397 const char *password, uint8_t is_twenty_byte_password) in ipmi_user_test_password() argument 401 IPMI_PASSWORD_TEST_PASSWORD, password, in ipmi_user_test_password() 532 char *password = NULL; in ipmi_user_test() local 553 password = ask_password(user_id); in ipmi_user_test() 554 if (password == NULL) { in ipmi_user_test() 559 password = argv[3]; in ipmi_user_test() [all …]
|
| /openbmc/qemu/tests/qemu-iotests/ |
| H A D | 293.out | 9 == adding a password to slot 4 == 10 == adding a password to slot 1 == 11 == adding a password to slot 3 == 12 == adding a password to slot 2 == 26 qemu-io: can't open: Invalid password, cannot unlock any keyslot 29 qemu-io: can't open: Invalid password, cannot unlock any keyslot 54 qemu-img: All the active keyslots match the (old) password that was given and erasing them will era… 57 qemu-io: can't open: Invalid password, cannot unlock any keyslot 58 qemu-io: can't open: Invalid password, cannot unlock any keyslot 59 qemu-io: can't open: Invalid password, cannot unlock any keyslot [all …]
|
| /openbmc/phosphor-webui/app/login/controllers/ |
| H A D | login-controller.js | 24 $scope.tryLogin = function(host, username, password, event) { argument 28 $scope.login(host, username, password); 31 $scope.login = function(host, username, password) { argument 34 if (!username || username == '' || !password || password == '' || 39 userModel.login(username, password, function(status, description) {
|
| /openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/ |
| H A D | common-password | 2 # /etc/pam.d/common-password - password-related modules common to all services 16 password [success=ok default=die] pam_pwquality.so debug 17 password [success=ok default=die] pam_ipmicheck.so spec_grp_name=ipmi use_authtok 18 password [success=ok ignore=ignore default=die] pam_pwhistory.so debug use_authtok 19 password [success=ok default=die] pam_unix.so sha512 use_authtok 20 password [success=1 default=die] pam_ipmisave.so spec_grp_name=ipmi spec_pass_file=/etc/ipmi_pass … 22 password requisite pam_deny.so 26 password required pam_permit.so
|
| /openbmc/webui-vue/src/views/SecurityAndAccess/UserManagement/ |
| H A D | ModalUser.vue | 135 label-for="password" 137 <b-form-text id="password-help-block"> 145 <input-password-toggle> 147 id="password" 148 v-model="form.password" 149 type="password" 150 autocomplete="new-password" 151 data-test-id="userManagement-input-password" 152 aria-describedby="password-help-block" 153 :state="getValidationState(v$.form.password)" [all …]
|
| /openbmc/webui-vue/src/views/ProfileSettings/ |
| H A D | ProfileSettings.vue | 41 <input-password-toggle> 43 id="old-password" 45 type="password" 46 autocomplete="current-password" 50 </input-password-toggle> 57 <b-form-text id="password-help-block"> 65 <input-password-toggle> 67 id="password" 69 type="password" 70 aria-describedby="password-help-block" [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/ |
| H A D | 0007-greeter.c-support-to-update-expired-password.patch | 4 Subject: [PATCH 7/8] greeter.c: support to update expired password 6 Update greeter to work with ui to handle expired password. It checks 7 whether password is expired after input user and password. If expired, 8 force user to update password immediately. It allows 3 times to try. If 38 + gtk_label_set_text(GTK_LABEL(prompt), _("New password:")); 40 + gtk_label_set_text(GTK_LABEL(prompt), _("Retype new password:")); 83 + // if new password is same as old one 97 + printf("update-new-password user=%s newpass=%s session=%s lang=%s\n", 113 /* password check failed */ 153 + else if (!strncmp(str, "password-expire", 15)) [all …]
|
| H A D | 0005-ui.c-handle-password-expire-and-update-new-password.patch | 4 Subject: [PATCH 5/8] ui.c: handle password-expire and update-new-password 22 + xwrite(greeter_pipe[0], "password-expire\n", 16); 31 + else if (!strncmp(str, "update-new-password", 19)) { 32 + xwrite(greeter_pipe[0], "update-new-password\n", 20); 40 + xwrite(greeter_pipe[0], "invalid-new-password\n", 21);
|
| /openbmc/openbmc/poky/bitbake/lib/layerindexlib/ |
| H A D | restapi.py | 144 def _get_json_response(apiurl=None, username=None, password=None, retry=True): argument 152 password=up.password 160 … res = self.layerindex._fetch_url(up_stripped.geturl(), username=username, password=password) 167 … _get_json_response(apiurl=up_stripped.geturl(), username=username, password=password, retry=False) 197 … index.apilinks = _get_json_response(apiurl=url, username=up.username, password=up.password) 214 username=up.username, password=up.password) 226 username=up.username, password=up.password) 242 username=up.username, password=up.password) 263 username=up.username, password=up.password)
|
| /openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/ |
| H A D | python3-passlib_1.7.4.bb | 1 SUMMARY = "comprehensive password hashing framework supporting over 30 schemes" 3 Passlib is a password hashing library for Python 2 & 3, which provides cross-platform \ 4 implementations of over 30 password hashing algorithms, as well as a framework for \ 5 managing existing password hashes. It’s designed to be useful for a wide range of \ 6 tasks, from verifying a hash found in /etc/shadow, to providing full-strength password \
|
| /openbmc/webui-vue/tests/unit/Global/__snapshots__/ |
| H A D | InputPasswordToggle.spec.js.snap | 5 class="input-password-toggle-container" 11 … title="Show password as plain text. Note: this will visually expose your password on the screen." 34 Show password as plain text. Note: this will visually expose your password on the screen.
|
| /openbmc/openbmc-test-automation/redfish/account_service/ |
| H A D | test_user_account.robot | 70 #username password role_id enabled 79 #username password role_id enabled 88 #username password role_id enabled 93 [Documentation] Verify Redfish create admin user with valid password and make sure 94 ... admin user failed to login with wrong password. 98 #username password role_id enabled wrong_password 103 [Documentation] Verify Redfish create operator user with valid password and make sure 104 ... operator user failed to login with wrong password. 108 #username password role_id enabled wrong_password 113 [Documentation] Verify Redfish create readonly user with valid password and make sure [all …]
|
| /openbmc/webui-vue/src/views/Operations/VirtualMedia/ |
| H A D | ModalConfigureConnection.vue | 45 :label="$t('pageVirtualMedia.modal.password')" 46 label-for="password" 49 id="password" 50 v-model="form.password" 51 type="password" 52 autocomplete="current-password" 53 data-test-id="configureConnection-input-password" 105 password: null, 157 this.form.password = null;
|
| /openbmc/openbmc/poky/bitbake/lib/bb/fetch2/ |
| H A D | ssh.py | 86 password = m.group('pass') 95 if password: 96 fr += ':%s' % password 126 password = m.group('pass') 135 if password: 136 fr += ':%s' % password
|
| /openbmc/openbmc-test-automation/ipmi/ |
| H A D | test_ipmi_user.robot | 74 ... user set password ${random_userid} ${valid_password} 133 [Documentation] Verify error while setting IPMI user with invalid password. 141 # Set invalid password for newly created user. 143 ... user set password ${random_userid} ${invalid_password} 145 # Delay added for user password to get set. 155 # Set invalid password for newly created user. 163 [Documentation] Verify IPMI user password using test command. 171 # Set valid password for newly created user. 173 ... user set password ${random_userid} ${valid_password} 175 # Verify newly set password using test command. [all …]
|