| /openbmc/openbmc-test-automation/ipmi/ |
| H A D | test_ipmi_payload.robot | 96 ... AND Delete Created User ${userid} 99 ${userid} ${username}= Create And Verify IPMI User 100 ${user_id_in_hex}= Convert To Hex ${userid} 101 ${userid_in_hex_format}= Convert To Hex ${userid} prefix=0x length=2 115 [Teardown] Run Keywords Delete Created User ${userid} AND FFDC On Test Case Fail 117 ${userid} ${username}= Create And Verify IPMI User ${operator_priv} Operator 123 …... Run External IPMI Raw Command ${payload_raw_cmd} U=${userid} P=${new_user_passwd} L=Opera… 142 [Teardown] Delete Created User ${userid} 144 ${userid} ${username}= Create And Verify IPMI User 148 Verify Set User Access Payload For Invalid Channel ${userid} ${channel} [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-networking/cyrus-sasl/cyrus-sasl/ |
| H A D | CVE-2022-24407.patch | 23 if (userid) sparams->utils->free(userid);
|
| /openbmc/openbmc-test-automation/redfish/account_service/ |
| H A D | test_ipmi_redfish_user.robot | 134 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 151 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 156 ... user set password ${userid} ${valid_password2} 171 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 176 ... user priv ${userid} ${operator_level_priv} ${CHANNEL_NUMBER} 189 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 194 ... user priv ${userid} ${readonly_level_priv} ${CHANNEL_NUMBER} 207 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 211 Run IPMI Standard Command user set name ${userid} "" 253 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege [all …]
|
| /openbmc/openbmc-build-scripts/jenkins/ |
| H A D | README.md | 13 | CI-MISC/openbmc-userid-validation | jenkins/userid-validation | |
|
| /openbmc/openbmc-test-automation/lib/ |
| H A D | ipmi_client.robot | 419 [Documentation] Create IPMI user with given userid and username. 420 [Arguments] ${userid} ${username} 423 # userid The user ID (e.g. "1", "2", etc.). 426 ${ipmi_cmd}= Catenate user set name ${userid} ${username} 428 ${user_info}= Get User Info ${userid} ${CHANNEL_NUMBER} 433 [Documentation] Enable the userid and verify that it has been enabled. 434 [Arguments] ${userid} 437 # userid A numeric userid (e.g. "4"). 439 Run IPMI Standard Command user enable ${userid} 440 ${user_info}= Get User Info ${userid} ${CHANNEL_NUMBER} [all …]
|
| H A D | ipmi_utils.py | 501 def get_user_info(userid, channel_number=1): argument 545 + str(userid) 548 if userid == "":
|
| /openbmc/ipmitool/lib/ |
| H A D | ipmi_sol.c | 104 uint8_t userid, int enable) in ipmi_sol_payload_access() argument 121 data[1] = userid & 0x3f; in ipmi_sol_payload_access() 131 enable ? "en" : "dis", userid, channel); in ipmi_sol_payload_access() 135 enable ? "en" : "dis", userid, channel, in ipmi_sol_payload_access() 147 uint8_t userid) in ipmi_sol_payload_access_status() argument 160 data[1] = userid & 0x3f; /* user id */ in ipmi_sol_payload_access_status() 172 userid, channel); in ipmi_sol_payload_access_status() 177 userid, channel, (rsp->data[0] & 0x02) ? "en":"dis"); in ipmi_sol_payload_access_status() 182 userid, channel, in ipmi_sol_payload_access_status() 1939 uint8_t userid = 1; in ipmi_sol_main() local [all …]
|
| /openbmc/openbmc-test-automation/systest/ |
| H A D | proc_freq_check.robot | 8 # OS_USERNAME The OS login userid (usually root).
|
| H A D | test_boot_acceptance.robot | 9 # OS_USERNAME The OS login userid (usually root).
|
| H A D | htx_softbootme_test.robot | 8 # OS_USERNAME The OS login userid (usually root).
|
| H A D | gpu_stress_test.robot | 7 # OS_USERNAME The OS login userid (usually "root").
|
| H A D | htx_hardbootme_test.robot | 8 # OS_USERNAME The OS login userid (usually root).
|
| /openbmc/docs/ |
| H A D | IPMITOOL-cheatsheet.md | 67 ipmitool -C 17 -H "$BMC_IP" -I lanplus -U "$BMC_USER" -P "$BMC_PASSWD" user set name <userid> <user… 73 ipmitool -C 17 -H "$BMC_IP" -I lanplus -U "$BMC_USER" -P "$BMC_PASSWD" user set password <userid>[<… 79 ipmitool -C 17 -H "$BMC_IP" -I lanplus -U "$BMC_USER" -P "$BMC_PASSWD" user disable <userid> 85 ipmitool -C 17 -H "$BMC_IP" -I lanplus -U "$BMC_USER" -P "$BMC_PASSWD" user enable <userid>
|
| /openbmc/docs/designs/ |
| H A D | expired-password.md | 18 Various computer systems ship with default userid and passwords and require the 109 The `/login` URI is enhanced. If it is used with correct credentials (userid 112 correct userid and incorrect password, or with an incorrect userid, the 182 network access is needed, a technician would create or modify the userid to
|
| /openbmc/openbmc-test-automation/network/ |
| H A D | test_cable_pull_recover.robot | 7 # OS_USERNAME The OS login userid (usually root).
|
| /openbmc/openbmc/meta-security/meta-hardening/ |
| H A D | README.md | 28 There are default example userid and passwards:
|
| /openbmc/openbmc/poky/meta/recipes-extended/tcp-wrappers/tcp-wrappers-7.6/ |
| H A D | 00_man_quoting.diff | 63 A client user identifier. Typically, a login name or a numeric userid.
|
| H A D | 01_man_portability.patch | 156 daemons have no `in.\' prefix to their name, or there is no userid
|
| /openbmc/openbmc-test-automation/redfish/update_service/ |
| H A D | test_redfish_image_upload.robot | 17 # OPENBMC_USERNAME The OS login userid.
|
| /openbmc/openbmc-test-automation/openpower/localuser/ |
| H A D | test_ipmi_redfish_user.robot | 240 [Documentation] Find and return userid that is not being used.
|