Home
last modified time | relevance | path

Searched refs:userid (Results 1 – 20 of 20) sorted by relevance

/openbmc/openbmc-test-automation/ipmi/
H A Dtest_ipmi_payload.robot96 ... AND Delete Created User ${userid}
99 ${userid} ${username}= Create And Verify IPMI User
100 ${user_id_in_hex}= Convert To Hex ${userid}
101 ${userid_in_hex_format}= Convert To Hex ${userid} prefix=0x length=2
115 [Teardown] Run Keywords Delete Created User ${userid} AND FFDC On Test Case Fail
117 ${userid} ${username}= Create And Verify IPMI User ${operator_priv} Operator
123 …... Run External IPMI Raw Command ${payload_raw_cmd} U=${userid} P=${new_user_passwd} L=Opera…
142 [Teardown] Delete Created User ${userid}
144 ${userid} ${username}= Create And Verify IPMI User
148 Verify Set User Access Payload For Invalid Channel ${userid} ${channel}
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-networking/cyrus-sasl/cyrus-sasl/
H A DCVE-2022-24407.patch23 if (userid) sparams->utils->free(userid);
/openbmc/openbmc-test-automation/redfish/account_service/
H A Dtest_ipmi_redfish_user.robot134 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege
151 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege
156 ... user set password ${userid} ${valid_password2}
171 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege
176 ... user priv ${userid} ${operator_level_priv} ${CHANNEL_NUMBER}
189 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege
194 ... user priv ${userid} ${readonly_level_priv} ${CHANNEL_NUMBER}
207 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege
211 Run IPMI Standard Command user set name ${userid} ""
253 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege
[all …]
/openbmc/openbmc-build-scripts/jenkins/
H A DREADME.md13 | CI-MISC/openbmc-userid-validation | jenkins/userid-validation | |
/openbmc/openbmc-test-automation/lib/
H A Dipmi_client.robot419 [Documentation] Create IPMI user with given userid and username.
420 [Arguments] ${userid} ${username}
423 # userid The user ID (e.g. "1", "2", etc.).
426 ${ipmi_cmd}= Catenate user set name ${userid} ${username}
428 ${user_info}= Get User Info ${userid} ${CHANNEL_NUMBER}
433 [Documentation] Enable the userid and verify that it has been enabled.
434 [Arguments] ${userid}
437 # userid A numeric userid (e.g. "4").
439 Run IPMI Standard Command user enable ${userid}
440 ${user_info}= Get User Info ${userid} ${CHANNEL_NUMBER}
[all …]
H A Dipmi_utils.py501 def get_user_info(userid, channel_number=1): argument
545 + str(userid)
548 if userid == "":
/openbmc/ipmitool/lib/
H A Dipmi_sol.c104 uint8_t userid, int enable) in ipmi_sol_payload_access() argument
121 data[1] = userid & 0x3f; in ipmi_sol_payload_access()
131 enable ? "en" : "dis", userid, channel); in ipmi_sol_payload_access()
135 enable ? "en" : "dis", userid, channel, in ipmi_sol_payload_access()
147 uint8_t userid) in ipmi_sol_payload_access_status() argument
160 data[1] = userid & 0x3f; /* user id */ in ipmi_sol_payload_access_status()
172 userid, channel); in ipmi_sol_payload_access_status()
177 userid, channel, (rsp->data[0] & 0x02) ? "en":"dis"); in ipmi_sol_payload_access_status()
182 userid, channel, in ipmi_sol_payload_access_status()
1939 uint8_t userid = 1; in ipmi_sol_main() local
[all …]
/openbmc/openbmc-test-automation/systest/
H A Dproc_freq_check.robot8 # OS_USERNAME The OS login userid (usually root).
H A Dtest_boot_acceptance.robot9 # OS_USERNAME The OS login userid (usually root).
H A Dhtx_softbootme_test.robot8 # OS_USERNAME The OS login userid (usually root).
H A Dgpu_stress_test.robot7 # OS_USERNAME The OS login userid (usually "root").
H A Dhtx_hardbootme_test.robot8 # OS_USERNAME The OS login userid (usually root).
/openbmc/docs/
H A DIPMITOOL-cheatsheet.md67 ipmitool -C 17 -H "$BMC_IP" -I lanplus -U "$BMC_USER" -P "$BMC_PASSWD" user set name <userid> <user…
73 ipmitool -C 17 -H "$BMC_IP" -I lanplus -U "$BMC_USER" -P "$BMC_PASSWD" user set password <userid>[<…
79 ipmitool -C 17 -H "$BMC_IP" -I lanplus -U "$BMC_USER" -P "$BMC_PASSWD" user disable <userid>
85 ipmitool -C 17 -H "$BMC_IP" -I lanplus -U "$BMC_USER" -P "$BMC_PASSWD" user enable <userid>
/openbmc/docs/designs/
H A Dexpired-password.md18 Various computer systems ship with default userid and passwords and require the
109 The `/login` URI is enhanced. If it is used with correct credentials (userid
112 correct userid and incorrect password, or with an incorrect userid, the
182 network access is needed, a technician would create or modify the userid to
/openbmc/openbmc-test-automation/network/
H A Dtest_cable_pull_recover.robot7 # OS_USERNAME The OS login userid (usually root).
/openbmc/openbmc/meta-security/meta-hardening/
H A DREADME.md28 There are default example userid and passwards:
/openbmc/openbmc/poky/meta/recipes-extended/tcp-wrappers/tcp-wrappers-7.6/
H A D00_man_quoting.diff63 A client user identifier. Typically, a login name or a numeric userid.
H A D01_man_portability.patch156 daemons have no `in.\' prefix to their name, or there is no userid
/openbmc/openbmc-test-automation/redfish/update_service/
H A Dtest_redfish_image_upload.robot17 # OPENBMC_USERNAME The OS login userid.
/openbmc/openbmc-test-automation/openpower/localuser/
H A Dtest_ipmi_redfish_user.robot240 [Documentation] Find and return userid that is not being used.