/openbmc/openbmc-test-automation/ipmi/ |
H A D | test_ipmi_payload.robot | 97 ... AND Delete Created User ${userid} 100 ${userid} ${username}= Create And Verify IPMI User 101 ${user_id_in_hex}= Convert To Hex ${userid} 102 ${userid_in_hex_format}= Convert To Hex ${userid} prefix=0x length=2 116 [Teardown] Run Keywords Delete Created User ${userid} AND FFDC On Test Case Fail 118 ${userid} ${username}= Create And Verify IPMI User ${operator_priv} Operator 124 …... Run External IPMI Raw Command ${payload_raw_cmd} U=${userid} P=${new_user_passwd} L=Opera… 143 [Teardown] Delete Created User ${userid} 145 ${userid} ${username}= Create And Verify IPMI User 149 Verify Set User Access Payload For Invalid Channel ${userid} ${channel} [all …]
|
/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_ipmi_redfish_user.robot | 132 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 149 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 154 ... user set password ${userid} ${valid_password2} 169 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 174 ... user priv ${userid} ${operator_level_priv} ${CHANNEL_NUMBER} 187 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 192 ... user priv ${userid} ${readonly_level_priv} ${CHANNEL_NUMBER} 205 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 209 Run IPMI Standard Command user set name ${userid} "" 251 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege [all …]
|
/openbmc/openbmc-test-automation/lib/ |
H A D | ipmi_client.robot | 406 [Documentation] Create IPMI user with given userid and username. 407 [Arguments] ${userid} ${username} 410 # userid The user ID (e.g. "1", "2", etc.). 413 ${ipmi_cmd}= Catenate user set name ${userid} ${username} 415 ${user_info}= Get User Info ${userid} ${CHANNEL_NUMBER} 420 [Documentation] Enable the userid and verify that it has been enabled. 421 [Arguments] ${userid} 424 # userid A numeric userid (e.g. "4"). 426 Run IPMI Standard Command user enable ${userid} [all...] |
H A D | ipmi_utils.py | 501 def get_user_info(userid, channel_number=1): argument 545 + str(userid) 548 if userid == "":
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-networking/cyrus-sasl/cyrus-sasl/ |
H A D | CVE-2022-24407.patch | 23 if (userid) sparams->utils->free(userid);
|
/openbmc/ipmitool/lib/ |
H A D | ipmi_sol.c | 104 uint8_t userid, int enable) in ipmi_sol_payload_access() argument 121 data[1] = userid & 0x3f; in ipmi_sol_payload_access() 131 enable ? "en" : "dis", userid, channel); in ipmi_sol_payload_access() 135 enable ? "en" : "dis", userid, channel, in ipmi_sol_payload_access() 147 uint8_t userid) in ipmi_sol_payload_access_status() argument 160 data[1] = userid & 0x3f; /* user id */ in ipmi_sol_payload_access_status() 172 userid, channel); in ipmi_sol_payload_access_status() 177 userid, channel, (rsp->data[0] & 0x02) ? "en":"dis"); in ipmi_sol_payload_access_status() 182 userid, channel, in ipmi_sol_payload_access_status() 1939 uint8_t userid = 1; in ipmi_sol_main() local [all …]
|
/openbmc/openbmc-build-scripts/jenkins/ |
H A D | README.md | 13 | CI-MISC/openbmc-userid-validation | jenkins/userid-validation | |
|
/openbmc/linux/arch/s390/hypfs/ |
H A D | hypfs_vm.c | 33 memcpy(parm_list.userid, query, DIAG2FC_NAME_LEN); in diag2fc() 34 ASCEBC(parm_list.userid, DIAG2FC_NAME_LEN); in diag2fc()
|
H A D | hypfs_vm.h | 39 char userid[DIAG2FC_NAME_LEN]; member
|
/openbmc/linux/drivers/s390/net/ |
H A D | netiucv.c | 153 char userid[9]; member 255 memcpy(tmp_uid, netiucv_printname(conn->userid, 8), 8); in netiucv_printuser() 262 return netiucv_printname(conn->userid, 8); in netiucv_printuser() 522 if (strncmp(ipvmid, conn->userid, 8) || in netiucv_callback_connreq() 861 rc = iucv_path_connect(conn->path, &netiucv_handler, conn->userid, in conn_action_start() 872 netiucv_printname(conn->userid, 8)); in conn_action_start() 878 " guest %s\n", netiucv_printname(conn->userid, 8)); in conn_action_start() 891 netiucv_printname(conn->userid, 8)); in conn_action_start() 950 netdev->name, conn->userid); in conn_action_inval() 1388 if (memcmp(username, priv->conn->userid, 9) && in user_write() [all …]
|
/openbmc/linux/include/net/iucv/ |
H A D | iucv.h | 278 u8 *userid, u8 *system, u8 *userdata, 486 u8 userid[8], u8 system[8], u8 userdata[16], void *private);
|
/openbmc/docs/ |
H A D | IPMITOOL-cheatsheet.md | 67 $ ipmitool -C 17 -H "$BMC_IP" -I lanplus -U "$BMC_USER" -P "$BMC_PASSWD" user set name <userid> <us… 73 $ ipmitool -C 17 -H "$BMC_IP" -I lanplus -U "$BMC_USER" -P "$BMC_PASSWD" user set password <userid>… 79 $ ipmitool -C 17 -H "$BMC_IP" -I lanplus -U "$BMC_USER" -P "$BMC_PASSWD" user disable <userid> 85 $ ipmitool -C 17 -H "$BMC_IP" -I lanplus -U "$BMC_USER" -P "$BMC_PASSWD" user enable <userid>
|
/openbmc/docs/designs/ |
H A D | expired-password.md | 18 Various computer systems ship with default userid and passwords and require the 109 The `/login` URI is enhanced. If it is used with correct credentials (userid 112 correct userid and incorrect password, or with an incorrect userid, the 182 network access is needed, a technician would create or modify the userid to
|
/openbmc/openbmc-test-automation/systest/ |
H A D | proc_freq_check.robot | 8 # OS_USERNAME The OS login userid (usually root).
|
H A D | test_boot_acceptance.robot | 9 # OS_USERNAME The OS login userid (usually root).
|
H A D | htx_softbootme_test.robot | 8 # OS_USERNAME The OS login userid (usually root).
|
H A D | gpu_stress_test.robot | 7 # OS_USERNAME The OS login userid (usually "root").
|
/openbmc/linux/drivers/target/iscsi/ |
H A D | iscsi_target_auth.c | 316 compare_len = strlen(auth->userid) + 1; in chap_server_compute_hash() 317 if (strncmp(chap_n, auth->userid, compare_len) != 0) { in chap_server_compute_hash()
|
H A D | iscsi_target_configfs.c | 423 DEF_NACL_AUTH_STR(userid, NAF_USERID_SET); 873 DEF_TPG_AUTH_STR(userid, NAF_USERID_SET); 1262 DEF_DISC_AUTH_STR(userid, NAF_USERID_SET);
|
/openbmc/openbmc-test-automation/network/ |
H A D | test_cable_pull_recover.robot | 7 # OS_USERNAME The OS login userid (usually root).
|
/openbmc/linux/drivers/net/wireless/ath/ath12k/ |
H A D | dp_mon.c | 588 u32 tlv_tag, u8 *tlv_data, u32 userid) in ath12k_dp_mon_rx_parse_status_tlv() argument 668 if (userid < HAL_MAX_UL_MU_USERS) { in ath12k_dp_mon_rx_parse_status_tlv() 670 &ppdu_info->userstats[userid]; in ath12k_dp_mon_rx_parse_status_tlv() 785 if (userid < HAL_MAX_UL_MU_USERS) { in ath12k_dp_mon_rx_parse_status_tlv() 787 ppdu_info->userid = userid; in ath12k_dp_mon_rx_parse_status_tlv() 788 ppdu_info->ampdu_id[userid] = in ath12k_dp_mon_rx_parse_status_tlv() 1024 u16 ampdu_id = ppduinfo->ampdu_id[ppduinfo->userid]; in ath12k_dp_mon_update_radiotap() 1599 u16 tlv_tag, u8 *tlv_data, u32 userid) in ath12k_dp_mon_tx_parse_status_tlv() argument
|
/openbmc/openbmc/meta-security/meta-hardening/ |
H A D | README.md | 28 There are default example userid and passwards:
|
/openbmc/openbmc/poky/meta/recipes-extended/tcp-wrappers/tcp-wrappers-7.6/ |
H A D | 00_man_quoting.diff | 63 A client user identifier. Typically, a login name or a numeric userid.
|
/openbmc/linux/net/iucv/ |
H A D | iucv.c | 876 u8 *userid, u8 *system, u8 *userdata, in iucv_path_connect() argument 892 if (userid) { in iucv_path_connect() 893 memcpy(parm->ctrl.ipvmid, userid, sizeof(parm->ctrl.ipvmid)); in iucv_path_connect()
|
/openbmc/openbmc-test-automation/redfish/update_service/ |
H A D | test_redfish_image_upload.robot | 17 # OPENBMC_USERNAME The OS login userid.
|