| /openbmc/openbmc-test-automation/lib/ |
| H A D | redfish_request.py | 106 def request_get(self, headers, url, timeout=10, verify=False): argument 139 + str(verify) 144 url, headers=headers, timeout=timeout, verify=verify 150 def request_patch(self, headers, url, data=None, timeout=10, verify=False): argument 188 + str(verify) 193 url, headers=headers, data=data, timeout=timeout, verify=verify 199 def request_post(self, headers, url, data=None, timeout=10, verify=False): argument 237 + str(verify) 246 verify=verify, 253 self, headers, url, files=None, data=None, timeout=10, verify=False argument [all …]
|
| /openbmc/phosphor-ipmi-flash/bmc/firmware-handler/test/ |
| H A D | firmware_json_unittest.cpp | 36 "unit" : "phosphor-ipmi-flash-bmc-verify.target", in TEST() 37 "path" : "/tmp/bmc.verify" in TEST() 64 "unit" : "phosphor-ipmi-flash-bmc-verify.target", in TEST() 65 "path" : "/tmp/bmc.verify" in TEST() 93 "unit" : "phosphor-ipmi-flash-bmc-verify.target", in TEST() 94 "path" : "/tmp/bmc.verify" in TEST() 122 "unit" : "phosphor-ipmi-flash-bmc-verify.target", in TEST() 123 "path" : "/tmp/bmc.verify" in TEST() 147 "unit" : "phosphor-ipmi-flash-bmc-verify.target", in TEST() 148 "path" : "/tmp/bmc.verify" in TEST() [all …]
|
| /openbmc/openbmc/meta-phosphor/recipes-phosphor/dbus/ |
| H A D | phosphor-dbus-monitor_git.bb | 25 SYSTEMD_PACKAGES = "${PN} phosphor-msl-verify" 27 SYSTEMD_SERVICE:phosphor-msl-verify = "phosphor-msl-verify.service" 40 FILES:phosphor-msl-verify = "${bindir}/phosphor-msl-verify" 42 PACKAGE_BEFORE_PN = "phosphor-msl-verify"
|
| /openbmc/openbmc/meta-quanta/meta-gbs/recipes-gbs/gbs-bmc-update/ |
| H A D | gbs-bmc-update.bb | 8 SRC_URI = " file://phosphor-ipmi-flash-bmc-verify.service \ 9 file://bmc-verify.sh \ 24 install -m 0755 ${UNPACKDIR}/bmc-verify.sh ${D}${bindir}/ 27 … install -m 0644 ${UNPACKDIR}/phosphor-ipmi-flash-bmc-verify.service ${D}${systemd_system_unitdir} 34 SYSTEMD_SERVICE:${PN} = "phosphor-ipmi-flash-bmc-verify.service"
|
| /openbmc/openbmc/meta-quanta/meta-gbs/recipes-gbs/gbs-bmc-update/files/ |
| H A D | phosphor-ipmi-flash-bmc-verify.service | 2 Description=Phosphor-ipmi-flash bmc verify service 5 ExecStart=/usr/bin/bmc-verify.sh 9 WantedBy=phosphor-ipmi-flash-bmc-verify.target
|
| /openbmc/openbmc/meta-quanta/meta-gbs/recipes-gbs/gbs-bios-update/files/ |
| H A D | phosphor-ipmi-flash-bios-verify.service | 2 Description=Phosphor-ipmi-flash verify BIOS service 5 ExecStart=/usr/bin/bios-verify.sh 9 WantedBy=phosphor-ipmi-flash-bios-verify.target
|
| /openbmc/openbmc/meta-quanta/meta-gbs/recipes-gbs/gbs-bios-update/ |
| H A D | gbs-bios-update.bb | 14 SRC_URI += " file://bios-verify.sh \ 16 file://phosphor-ipmi-flash-bios-verify.service \ 25 install -m 0755 ${UNPACKDIR}/bios-verify.sh ${D}${bindir}/ 29 … install -m 0644 ${UNPACKDIR}/phosphor-ipmi-flash-bios-verify.service ${D}${systemd_system_unitdir} 38 SYSTEMD_SERVICE:${PN} = "phosphor-ipmi-flash-bios-verify.service phosphor-ipmi-flash-bios-update.se…
|
| /openbmc/openbmc/meta-ibm/recipes-phosphor/dbus/ |
| H A D | phosphor-dbus-monitor_%.bbappend | 3 …NK:phosphor-msl-verify:append:ibm-ac-server = " ../phosphor-msl-verify.service:obmc-chassis-powero…
|
| /openbmc/openbmc/meta-google/recipes-phosphor/flash/ |
| H A D | inplace-gbmc-update.bb | 18 file://inplace-gbmc-verify.service \ 19 file://inplace-gbmc-verify.sh \ 25 SYSTEMD_SERVICE:${PN} += "inplace-gbmc-verify.service" 32 sed -i 's,@ALLOW_DEV@,,' ${UNPACKDIR}/inplace-gbmc-verify.sh 48 sed -i 's,@ALLOW_DEV@,--allow-dev,' ${UNPACKDIR}/inplace-gbmc-verify.sh
|
| H A D | dummy-gbmc-update.bb | 11 SRC_URI += "file://dummy-verify.service" 15 SYSTEMD_SERVICE:${PN} += "dummy-verify.service" 22 install -m 0644 ${UNPACKDIR}/dummy-verify.service ${D}${systemd_system_unitdir}
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/memtool/memtool/ |
| H A D | test_read_write_plainfiles.sh | 20 verify() { function 40 verify "$ACTUAL" "$EXPECTED" "memtool read from plain file" 54 verify "$ACTUAL" "$EXPECTED" "memtool write to plain file"
|
| /openbmc/openbmc-tools/check_journal/ |
| H A D | check_journal | 21 verify=verify_ssl, 34 verify=verify_ssl, 58 response3 = session.get(page_uri, verify=verify_ssl) 85 verify=verify_ssl,
|
| /openbmc/openpower-pnor-code-mgmt/test/ |
| H A D | test_signature.cpp | 101 EXPECT_TRUE(signature->verify()); in TEST_F() 110 EXPECT_FALSE(signature->verify()); in TEST_F() 119 EXPECT_FALSE(signature->verify()); in TEST_F() 128 EXPECT_FALSE(signature->verify()); in TEST_F() 136 EXPECT_FALSE(signature->verify()); in TEST_F()
|
| /openbmc/u-boot/cmd/ |
| H A D | source.c | 51 int verify; in source() local 60 verify = env_get_yesno("verify"); in source() 78 if (verify) { in source() 135 if (verify) { in source()
|
| /openbmc/phosphor-ipmi-flash/bmc/firmware-handler/ |
| H A D | firmware_handlers_builder.cpp | 92 const auto& verify = a.at("verification"); in buildHandlerFromJson() local 93 const std::string verifyType = verify.at("type"); in buildHandlerFromJson() 96 pack->verification = buildFileSystemd(verify); in buildHandlerFromJson() 100 pack->verification = buildSystemd(verify); in buildHandlerFromJson()
|
| /openbmc/openbmc-tools/openbmctool/ |
| H A D | openbmctool.py | 116 resp = session.get(url, headers=jsonHeader, verify=False, timeout=baseTimeout) 130 …t('https://'+args.host+'/login', headers=jsonHeader,json={"data":[args.user,args.PW]},verify=False) 405 resp = session.get(url, headers=jsonHeader, verify=False, timeout=baseTimeout) 435 …://'+host+'/login', headers=jsonHeader, json = {"data": [username, pw]}, verify=False, timeout=bas… 477 …://'+host+'/logout', headers=jsonHeader,json = {"data": [username, pw]}, verify=False, timeout=bas… 506 res = session.get(url, headers=jsonHeader, verify=False, timeout=baseTimeout) 550 res = session.get(url, headers=jsonHeader, verify=False, timeout=baseTimeout) 565 res = session.get(url, headers=jsonHeader, verify=False, timeout=baseTimeout) 606 res = session.get(url, headers=jsonHeader, verify=False) 685 res = session.get(url, headers=jsonHeader, verify=False, timeout=baseTimeout) [all …]
|
| /openbmc/openbmc/meta-phosphor/recipes-phosphor/flash/ |
| H A D | noverify-bmc-update.bb | 6 SRC_URI += "file://noverify-bmc-verify.service" 10 SYSTEMD_SERVICE:${PN} += "noverify-bmc-verify.service" 19 install -m 0644 ${UNPACKDIR}/noverify-bmc-verify.service ${D}${systemd_system_unitdir}
|
| /openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/ |
| H A D | python3-rsa_4.9.1.bb | 16 pyrsa-verify \ 24 ALTERNATIVE_LINK_NAME[pyrsa-verify] = "${bindir}/pyrsa-verify"
|
| /openbmc/qemu/tests/qemu-iotests/ |
| H A D | 188.out | 12 == verify pattern == 16 == verify open failure with wrong password == 19 == verify that has_zero_init returns false when preallocating ==
|
| /openbmc/openbmc/meta-security/meta-integrity/data/debug-keys/ |
| H A D | README.md | 8 - x509_ima.der: Certificate containing public key (of privkey_ima.pem) to verify signatures 10 The CA's (self-signed) certificate can be used to verify the validity of 16 openssl verify -CAfile ima-local-ca.pem x509_ima.der
|
| /openbmc/phosphor-dbus-monitor/mslverify/ |
| H A D | meson.build | 1 sources_mslverify = ['verify.cpp'] 10 'phosphor-msl-verify',
|
| /openbmc/phosphor-ipmi-flash/ |
| H A D | ipmi_flash.md | 45 - `open(/flash/verify)` 66 - `open(/flash/verify)` 70 - `commit(/flash/verify)` `state -> verificationStarted` 78 - `close(/flash/verify)` `state -> verificationCompleted` 87 - `open(/flash/verify)` 122 | 9. `open(/flash/verify)` | VP | VP | 126 | 12. `close(/flash/verify)` | VC | UP |
|
| H A D | meson.options | 109 'verify-status-filename', 111 value: '/tmp/bmc.verify', 121 'bios-verify-status-filename', 123 value: '/tmp/bios.verify', 134 'verify-dbus-service', 136 value: 'phosphor-ipmi-flash-bmc-verify.target', 158 'verify-bios-target', 160 value: 'phosphor-ipmi-flash-bios-verify.target',
|
| /openbmc/openbmc-test-automation/ipmi/ |
| H A D | test_ipmi_mc_id.robot | 38 # Get the management controller ID and verify. 41 # Set the value back to the initial value and verify. 44 # Get the management controller ID and verify. 51 # Disable management controller ID string status via IPMI and verify. 55 # Enable management controller ID string status via IPMI and verify. 63 # Disable management controller ID string status via raw IPMI and verify. 67 # Enable management controller ID string status via raw IPMI and verify.
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/xmlsec1/xmlsec1/ |
| H A D | run-ptest | 33 check_return verify-single-key 39 check_return verify-keys-manager 44 check_return verify-x509 49 check_return verify-res
|