Home
last modified time | relevance | path

Searched refs:passwords (Results 1 – 25 of 46) sorted by relevance

12

/openbmc/qemu/tests/qemu-iotests/
H A D14948 if passwords is not None:
49 self.passwords = passwords
51 self.passwords = {}
54 self.passwords["0"] = "123456"
56 self.passwords["0"] = password
76 if slot in self.passwords:
77 return (self.passwords[slot], slot)
88 if slot in self.passwords:
136 fh.write(config.passwords[slot])
492 passwords={
[all …]
/openbmc/openbmc/poky/meta/recipes-gnome/libsecret/
H A Dlibsecret_0.21.4.bb1 SUMMARY = "libsecret is a library for storing and retrieving passwords and other secrets"
3 the freedesktop.org project, a cross-desktop effort to access passwords, \
/openbmc/openbmc/poky/meta/recipes-extended/pam/libpam/pam.d/
H A Dcommon-password6 # used to change user passwords. The default is pam_unix.
10 # The "sha512" option enables salted SHA512 passwords. Without this option,
/openbmc/openbmc/poky/documentation/dev-manual/
H A Dsecuring-images.rst57 As with system passwords, the default credentials for accessing a
127 passwords for any extra users you might add (e.g. administrative or
128 service type users). When you set up passwords for multiple images or
129 users, you should not duplicate passwords.
131 To set up passwords, use the :ref:`ref-classes-extrausers` class, which
133 user passwords, see the ":ref:`ref-classes-extrausers`" section.
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/
H A Dcommon-password6 # used to change user passwords. The default is pam_unix.
10 # The "sha512" option enables salted SHA512 passwords. Without this option,
/openbmc/qemu/docs/system/
H A Dvnc-security.rst12 Without passwords
30 With passwords
34 Since the protocol limits passwords to 8 characters it should not be
97 With x509 certificates, client verification and passwords
198 file with accounts. Note that the ``passwd.db`` file stores passwords
/openbmc/openbmc/poky/meta/recipes-connectivity/inetutils/inetutils/
H A Drexec.xinetd.inetutils5 # passwords.
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm2/tpm2-totp/
H A Dtpm2-totp_0.3.0.bb1 …MARY = "Attest the trustworthiness of a device against a human using time-based one-time passwords"
/openbmc/openbmc/meta-security/recipes-security/ncrack/
H A Dncrack_0.7.bb2 …PTION = "Ncrack is designed for high-speed parallel testing of network devices for poor passwords."
/openbmc/openbmc/meta-openembedded/meta-gnome/recipes-support/usermode/
H A Dusermode_1.114.bb7 * userpasswd allows users to change their passwords. \
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/libpwquality/
H A Dlibpwquality_1.4.5.bb1 DESCRIPTION = "Library for password quality checking and generating random passwords"
/openbmc/docs/designs/
H A Dexpired-password.md1 # Initial expired passwords
13 may lead to BMCs which have default passwords being on the network for long time
18 Various computer systems ship with default userid and passwords and require the
180 example, to set and track assigned passwords.
197 local users which have default passwords configured in the BMC firmware image.
H A Destoraged.md78 the passwords itself.
121 used by eStoraged to generate two different passwords: the encryption password
122 and the device password (if hardware locking is available). The passwords will
/openbmc/ipmitool/src/plugins/lanplus/
H A DREADME.lanplus42 * IPMIv2 compliant BMCs are supposed to support 20 byte passwords, as well
44 20 byte class password. We do not currently support 20 byte passwords. It
/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/
H A Dlogin.defs_shadow-sysroot255 # Warn about weak passwords (but still allow them) if you are root.
288 # If set to "yes", new passwords will be encrypted using the MD5-based
290 # It supports passwords of unlimited length and longer salt strings.
291 # Set to "no" if you need to copy encrypted passwords to other systems
H A Dsecuretty150 # Local X displays (allows empty passwords with pam_unix's nullok_secure)
/openbmc/qemu/
H A Dqemu.sasl40 # Note that this file stores passwords in clear text.
/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/pam.d/
H A Dsu5 # This allows root to su without passwords (normal operation)
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/
H A D0008-greeter.c-show-information-on-gtk-label-info.patch30 // if new passwords not match, retry for 3 times at most
H A D0007-greeter.c-support-to-update-expired-password.patch74 + // if new passwords not match, retry for 3 times at most
/openbmc/linux/drivers/platform/x86/hp/
H A DKconfig72 the need for passwords for both remote and local management. It supports
/openbmc/openbmc/poky/meta/recipes-connectivity/openssh/openssh/
H A Dsshd_config58 # To disable tunneled clear text passwords, change to no here!
/openbmc/docs/architecture/
H A Duser-management.md14 2. For security reasons, avoid transmitting passwords over any D-Bus API.
360 Stacked PAM modules allow all 'ipmi' group user passwords to be stored in
384 | | passwords | |
545 Any systems which doesn’t have in-band system interface can generate passwords
/openbmc/openbmc/poky/meta/recipes-connectivity/ppp/
H A Dppp_2.5.0.bb72 SUMMARY:${PN}-password = "Plugin for PPP to get passwords via a pipe"
/openbmc/u-boot/doc/
H A DREADME.iscsi24 data like passwords can be securely transmitted.

12