Home
last modified time | relevance | path

Searched refs:userid (Results 1 – 25 of 36) sorted by relevance

12

/openbmc/openbmc-test-automation/ipmi/
H A Dtest_ipmi_payload.robot97 ... AND Delete Created User ${userid}
100 ${userid} ${username}= Create And Verify IPMI User
101 ${user_id_in_hex}= Convert To Hex ${userid}
102 ${userid_in_hex_format}= Convert To Hex ${userid} prefix=0x length=2
116 [Teardown] Run Keywords Delete Created User ${userid} AND FFDC On Test Case Fail
118 ${userid} ${username}= Create And Verify IPMI User ${operator_priv} Operator
124 …... Run External IPMI Raw Command ${payload_raw_cmd} U=${userid} P=${new_user_passwd} L=Opera…
143 [Teardown] Delete Created User ${userid}
145 ${userid} ${username}= Create And Verify IPMI User
149 Verify Set User Access Payload For Invalid Channel ${userid} ${channel}
[all …]
/openbmc/openbmc-test-automation/redfish/account_service/
H A Dtest_ipmi_redfish_user.robot132 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege
149 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege
154 ... user set password ${userid} ${valid_password2}
169 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege
174 ... user priv ${userid} ${operator_level_priv} ${CHANNEL_NUMBER}
187 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege
192 ... user priv ${userid} ${readonly_level_priv} ${CHANNEL_NUMBER}
205 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege
209 Run IPMI Standard Command user set name ${userid} ""
251 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege
[all …]
/openbmc/openbmc-test-automation/lib/
H A Dipmi_client.robot406 [Documentation] Create IPMI user with given userid and username.
407 [Arguments] ${userid} ${username}
410 # userid The user ID (e.g. "1", "2", etc.).
413 ${ipmi_cmd}= Catenate user set name ${userid} ${username}
415 ${user_info}= Get User Info ${userid} ${CHANNEL_NUMBER}
420 [Documentation] Enable the userid and verify that it has been enabled.
421 [Arguments] ${userid}
424 # userid A numeric userid (e.g. "4").
426 Run IPMI Standard Command user enable ${userid}
[all...]
H A Dipmi_utils.py501 def get_user_info(userid, channel_number=1): argument
545 + str(userid)
548 if userid == "":
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-networking/cyrus-sasl/cyrus-sasl/
H A DCVE-2022-24407.patch23 if (userid) sparams->utils->free(userid);
/openbmc/ipmitool/lib/
H A Dipmi_sol.c104 uint8_t userid, int enable) in ipmi_sol_payload_access() argument
121 data[1] = userid & 0x3f; in ipmi_sol_payload_access()
131 enable ? "en" : "dis", userid, channel); in ipmi_sol_payload_access()
135 enable ? "en" : "dis", userid, channel, in ipmi_sol_payload_access()
147 uint8_t userid) in ipmi_sol_payload_access_status() argument
160 data[1] = userid & 0x3f; /* user id */ in ipmi_sol_payload_access_status()
172 userid, channel); in ipmi_sol_payload_access_status()
177 userid, channel, (rsp->data[0] & 0x02) ? "en":"dis"); in ipmi_sol_payload_access_status()
182 userid, channel, in ipmi_sol_payload_access_status()
1939 uint8_t userid = 1; in ipmi_sol_main() local
[all …]
/openbmc/openbmc-build-scripts/jenkins/
H A DREADME.md13 | CI-MISC/openbmc-userid-validation | jenkins/userid-validation | |
/openbmc/linux/arch/s390/hypfs/
H A Dhypfs_vm.c33 memcpy(parm_list.userid, query, DIAG2FC_NAME_LEN); in diag2fc()
34 ASCEBC(parm_list.userid, DIAG2FC_NAME_LEN); in diag2fc()
H A Dhypfs_vm.h39 char userid[DIAG2FC_NAME_LEN]; member
/openbmc/linux/drivers/s390/net/
H A Dnetiucv.c153 char userid[9]; member
255 memcpy(tmp_uid, netiucv_printname(conn->userid, 8), 8); in netiucv_printuser()
262 return netiucv_printname(conn->userid, 8); in netiucv_printuser()
522 if (strncmp(ipvmid, conn->userid, 8) || in netiucv_callback_connreq()
861 rc = iucv_path_connect(conn->path, &netiucv_handler, conn->userid, in conn_action_start()
872 netiucv_printname(conn->userid, 8)); in conn_action_start()
878 " guest %s\n", netiucv_printname(conn->userid, 8)); in conn_action_start()
891 netiucv_printname(conn->userid, 8)); in conn_action_start()
950 netdev->name, conn->userid); in conn_action_inval()
1388 if (memcmp(username, priv->conn->userid, 9) && in user_write()
[all …]
/openbmc/linux/include/net/iucv/
H A Diucv.h278 u8 *userid, u8 *system, u8 *userdata,
486 u8 userid[8], u8 system[8], u8 userdata[16], void *private);
/openbmc/docs/
H A DIPMITOOL-cheatsheet.md67 $ ipmitool -C 17 -H "$BMC_IP" -I lanplus -U "$BMC_USER" -P "$BMC_PASSWD" user set name <userid> <us…
73 $ ipmitool -C 17 -H "$BMC_IP" -I lanplus -U "$BMC_USER" -P "$BMC_PASSWD" user set password <userid>…
79 $ ipmitool -C 17 -H "$BMC_IP" -I lanplus -U "$BMC_USER" -P "$BMC_PASSWD" user disable <userid>
85 $ ipmitool -C 17 -H "$BMC_IP" -I lanplus -U "$BMC_USER" -P "$BMC_PASSWD" user enable <userid>
/openbmc/docs/designs/
H A Dexpired-password.md18 Various computer systems ship with default userid and passwords and require the
109 The `/login` URI is enhanced. If it is used with correct credentials (userid
112 correct userid and incorrect password, or with an incorrect userid, the
182 network access is needed, a technician would create or modify the userid to
/openbmc/openbmc-test-automation/systest/
H A Dproc_freq_check.robot8 # OS_USERNAME The OS login userid (usually root).
H A Dtest_boot_acceptance.robot9 # OS_USERNAME The OS login userid (usually root).
H A Dhtx_softbootme_test.robot8 # OS_USERNAME The OS login userid (usually root).
H A Dgpu_stress_test.robot7 # OS_USERNAME The OS login userid (usually "root").
/openbmc/linux/drivers/target/iscsi/
H A Discsi_target_auth.c316 compare_len = strlen(auth->userid) + 1; in chap_server_compute_hash()
317 if (strncmp(chap_n, auth->userid, compare_len) != 0) { in chap_server_compute_hash()
H A Discsi_target_configfs.c423 DEF_NACL_AUTH_STR(userid, NAF_USERID_SET);
873 DEF_TPG_AUTH_STR(userid, NAF_USERID_SET);
1262 DEF_DISC_AUTH_STR(userid, NAF_USERID_SET);
/openbmc/openbmc-test-automation/network/
H A Dtest_cable_pull_recover.robot7 # OS_USERNAME The OS login userid (usually root).
/openbmc/linux/drivers/net/wireless/ath/ath12k/
H A Ddp_mon.c588 u32 tlv_tag, u8 *tlv_data, u32 userid) in ath12k_dp_mon_rx_parse_status_tlv() argument
668 if (userid < HAL_MAX_UL_MU_USERS) { in ath12k_dp_mon_rx_parse_status_tlv()
670 &ppdu_info->userstats[userid]; in ath12k_dp_mon_rx_parse_status_tlv()
785 if (userid < HAL_MAX_UL_MU_USERS) { in ath12k_dp_mon_rx_parse_status_tlv()
787 ppdu_info->userid = userid; in ath12k_dp_mon_rx_parse_status_tlv()
788 ppdu_info->ampdu_id[userid] = in ath12k_dp_mon_rx_parse_status_tlv()
1024 u16 ampdu_id = ppduinfo->ampdu_id[ppduinfo->userid]; in ath12k_dp_mon_update_radiotap()
1599 u16 tlv_tag, u8 *tlv_data, u32 userid) in ath12k_dp_mon_tx_parse_status_tlv() argument
/openbmc/openbmc/meta-security/meta-hardening/
H A DREADME.md28 There are default example userid and passwards:
/openbmc/openbmc/poky/meta/recipes-extended/tcp-wrappers/tcp-wrappers-7.6/
H A D00_man_quoting.diff63 A client user identifier. Typically, a login name or a numeric userid.
/openbmc/linux/net/iucv/
H A Diucv.c876 u8 *userid, u8 *system, u8 *userdata, in iucv_path_connect() argument
892 if (userid) { in iucv_path_connect()
893 memcpy(parm->ctrl.ipvmid, userid, sizeof(parm->ctrl.ipvmid)); in iucv_path_connect()
/openbmc/openbmc-test-automation/redfish/update_service/
H A Dtest_redfish_image_upload.robot17 # OPENBMC_USERNAME The OS login userid.

12