Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 478) sorted by relevance

12345678910>>...20

/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/
H A Dshadow-update-pam-conf.patch37 -password include system-auth
38 +password include common-password
47 -password include system-auth
48 +password include common-password
58 +password include common-password
68 +password include common-password
78 +password include common-password
88 +password include common-password
98 +password include common-password
108 +password include common-password
[all …]
/openbmc/openbmc-test-automation/lib/
H A Dhost.tcl46 proc get_host_domain {host username password {quiet 1}} {
64 "sshpass -p $password ssh -o StrictHostKeyChecking=no -k $username@$host\
71 proc get_host_name_servers {host username password {quiet 1}} {
88 lassign [cmd_fnc "sshpass -p $password ssh -o StrictHostKeyChecking=no -k\
97 proc get_host_mac_address {host username password {interface {}} {quiet 1}} {
119 $password $quiet]
120 lassign [cmd_fnc "sshpass -p $password ssh -o StrictHostKeyChecking=no -k\
128 proc get_host_gateway {host username password {quiet 1}} {
153 proc get_host_default_interface {host username password {quiet 1} } {
178 proc get_host_netmask {host username password {interface {}} {quiet 1}} {
[all …]
/openbmc/docs/designs/
H A Dexpired-password.md20 system is accessible with a default password.
30 password) may be expired.
42 property which supports a password change dialog.
47 Note the terminology: An "expired password" is a special case of "password
70 to change the password).
110 and password) and the password needs to be changed the request will fail to
126 for the expired password dialog.
153 the BMC's initial expired password and password expired for another cause such
157 password change dialog for the signon screen.
161 expired password:
[all …]
/openbmc/webui-vue/src/views/ChangePassword/
H A DChangePassword.vue2 <div class="change-password-container">
16 label-for="password"
19 <input-password-toggle>
21 id="password"
24 type="password"
35 </input-password-toggle>
41 <input-password-toggle>
45 type="password"
98 password: null,
108 password: { required },
[all …]
/openbmc/webui-vue/src/views/Login/
H A DLogin.vue35 <label for="password">{{ $t('pageLogin.password') }}</label>
36 <input-password-toggle>
38 id="password"
39 v-model="userInfo.password"
42 type="password"
43 data-test-id="login-input-password"
45 @input="v$.userInfo.password.$touch()"
53 </input-password-toggle>
96 password: null,
121 password: {
[all …]
/openbmc/openbmc-test-automation/security/
H A Dtest_bmc_expire_password.robot58 # Change to a valid password.
67 [Documentation] Expire root password and update bad password via Redfish and expect an error.
91 # Change to a valid password.
130 # Change valid password.
138 # Verify valid password.
188 # verify new password
193 [Documentation] Force expire admin password and update admin password via GUI.
215 # Verify valid password.
338 # Expire the password.
342 Should Contain Any ${output} password expiry information changed password changed
[all …]
/openbmc/openbmc/meta-google/recipes-extended/pam/
H A Dlibpam_%.bbappend8 sed -i '/pam_pwquality.so/d' ${D}${sysconfdir}/pam.d/common-password
11 # with "password". This makes sure that if pam_pwquality.so was the first
14 # the user for a new password but use the one provided by the previously
15 # stacked password module". Since there is no "previous" entry, it never
16 # asks for a password which causes the process to fail.
17 awk '/^password/ && !f{sub(/ use_authtok/, ""); f=1} 1' \
18 ${D}${sysconfdir}/pam.d/common-password \
19 > ${D}${sysconfdir}/pam.d/common-password.new
20 mv ${D}${sysconfdir}/pam.d/common-password.new \
21 ${D}${sysconfdir}/pam.d/common-password
/openbmc/ipmitool/lib/
H A Dipmi_main.c508 if (password) { in ipmi_main()
509 free(password); in ipmi_main()
510 password = NULL; in ipmi_main()
524 if (password) { in ipmi_main()
525 free(password); in ipmi_main()
664 if (password) { in ipmi_main()
665 free(password); in ipmi_main()
680 if (password) { in ipmi_main()
691 if (password) { in ipmi_main()
1066 free(password); in ipmi_main()
[all …]
H A Dipmi_user.c206 if (password != NULL) { in _ipmi_set_user_password()
532 char *password = NULL; in ipmi_user_test() local
553 password = ask_password(user_id); in ipmi_user_test()
554 if (password == NULL) { in ipmi_user_test()
559 password = argv[3]; in ipmi_user_test()
563 password, in ipmi_user_test()
625 char *password = NULL; in ipmi_user_password() local
636 password = ask_password(user_id); in ipmi_user_password()
637 if (password == NULL) { in ipmi_user_password()
652 password = argv[3]; in ipmi_user_password()
[all …]
/openbmc/qemu/tests/qemu-iotests/
H A D293.out9 == adding a password to slot 4 ==
10 == adding a password to slot 1 ==
11 == adding a password to slot 3 ==
12 == adding a password to slot 2 ==
26 qemu-io: can't open: Invalid password, cannot unlock any keyslot
29 qemu-io: can't open: Invalid password, cannot unlock any keyslot
57 qemu-io: can't open: Invalid password, cannot unlock any keyslot
58 qemu-io: can't open: Invalid password, cannot unlock any keyslot
59 qemu-io: can't open: Invalid password, cannot unlock any keyslot
69 qemu-io: can't open: Invalid password, cannot unlock any keyslot
[all …]
/openbmc/phosphor-webui/app/profile-settings/controllers/
H A Dprofile-settings-controller.js19 $scope.password;
26 const updatePassword = function(password) { argument
28 APIUtils.updateUser($scope.username, null, password)
37 $scope.password = '';
61 const password = form.password.$viewValue;
62 updatePassword(password);
/openbmc/webui-vue/src/views/SecurityAndAccess/UserManagement/
H A DModalUser.vue130 label-for="password"
140 <input-password-toggle>
142 id="password"
144 type="password"
175 <input-password-toggle>
180 type="password"
272 password: '',
316 password: {
343 userData.password = this.form.password;
357 userData.password = this.form.password;
[all …]
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/
H A Dcommon-password2 # /etc/pam.d/common-password - password-related modules common to all services
16 password [success=ok default=die] pam_pwquality.so debug
17 password [success=ok default=die] pam_ipmicheck.so spec_grp_name=ipmi use_authtok
18 password [success=ok ignore=ignore default=die] pam_pwhistory.so debug use_authtok
19 password [success=ok default=die] pam_unix.so sha512 use_authtok
20 password [success=1 default=die] pam_ipmisave.so spec_grp_name=ipmi spec_pass_file=/etc/ipmi_pass …
22 password requisite pam_deny.so
26 password required pam_permit.so
/openbmc/linux/security/keys/encrypted-keys/
H A Decryptfs_format.c21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key()
57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok()
59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok()
67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok()
73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok()
74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
/openbmc/phosphor-webui/app/login/controllers/
H A Dlogin-controller.js24 $scope.tryLogin = function(host, username, password, event) { argument
28 $scope.login(host, username, password);
31 $scope.login = function(host, username, password) { argument
34 if (!username || username == '' || !password || password == '' ||
39 userModel.login(username, password, function(status, description) {
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/
H A Dconvert-pam-configs.sh12 pam_cracklib=$(grep "^password.*pam_cracklib.so" ${PAM_CONF_DIR}/common-password)
20 sed -i.bak -e "s/^password.*pam_cracklib.so.*/$pwquality/" ${PAM_CONF_DIR}/common-password
21 echo "# This file was converted by $0" >>${PAM_CONF_DIR}/common-password
25 pam_pwhistory=$(grep "^password.*pam_pwhistory.so.*remember" ${PAM_CONF_DIR}/common-password)
33 sed -i.bak -e "s/^password.*pam_pwhistory.so.*/$pwhistory/" ${PAM_CONF_DIR}/common-password
34 echo "# This file was converted by $0" >>${PAM_CONF_DIR}/common-password
/openbmc/openbmc/poky/bitbake/lib/hashserv/
H A Dclient.py21 def __init__(self, username=None, password=None): argument
25 self.password = password
34 await self.auth(self.username, self.password)
151 self.password = token
165 self.password = result["token"]
231 def __init__(self, username=None, password=None): argument
233 self.password = password
266 return AsyncClient(self.username, self.password)
276 password=None, argument
282 self.password = password
[all …]
/openbmc/openbmc-test-automation/gui/test/access_control/
H A Dtest_obmc_gui_local_users.robot23 ${xpath_input_password} //input[@id="password"]
89 [Arguments] ${username} ${password} ${privilege}=Administrator
94 # password New user password.
99 Add User Details ${username} ${password} ${privilege} ${account_status}
103 [Arguments] ${username} ${password} ${privilege} ${account_status}
107 # password User password.
115 Input Password ${xpath_input_password} ${password}
116 Input Password ${xpath_confirm_password} ${password}
145 [Arguments] ${username} ${password} ${expected_result}=${True}
149 # password User password.
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/
H A D0007-greeter.c-support-to-update-expired-password.patch4 Subject: [PATCH 7/8] greeter.c: support to update expired password
6 Update greeter to work with ui to handle expired password. It checks
7 whether password is expired after input user and password. If expired,
8 force user to update password immediately. It allows 3 times to try. If
38 + gtk_label_set_text(GTK_LABEL(prompt), _("New password:"));
40 + gtk_label_set_text(GTK_LABEL(prompt), _("Retype new password:"));
83 + // if new password is same as old one
113 /* password check failed */
153 + else if (!strncmp(str, "password-expire", 15))
158 else if( !strncmp(str, "password", 8))
[all …]
/openbmc/openbmc/poky/bitbake/lib/layerindexlib/
H A Drestapi.py144 def _get_json_response(apiurl=None, username=None, password=None, retry=True): argument
152 password=up.password
160 … res = self.layerindex._fetch_url(up_stripped.geturl(), username=username, password=password)
167 … _get_json_response(apiurl=up_stripped.geturl(), username=username, password=password, retry=False)
197 … index.apilinks = _get_json_response(apiurl=url, username=up.username, password=up.password)
214 username=up.username, password=up.password)
226 username=up.username, password=up.password)
242 username=up.username, password=up.password)
263 username=up.username, password=up.password)
/openbmc/webui-vue/src/views/ProfileSettings/
H A DProfileSettings.vue31 <input-password-toggle>
33 id="old-password"
35 type="password"
39 </input-password-toggle>
54 <input-password-toggle>
56 id="password"
58 type="password"
80 </input-password-toggle>
87 <input-password-toggle>
91 type="password"
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/rabbitmq-c/files/
H A DCVE-2023-35789.patch8 Subject: [PATCH] Add option to read username/password from file (#781)
10 * Add option to read username/password from file
26 +#define PASSWORDPREFIX "password:"
40 "the password to login with", "password"},
44 + "path to file containing username/password for authentication", "file"},
79 + die("Malformed auth file (missing password)");
98 ci->password = NULL;
111 die("--password and --url options cannot be used at the same time");
113 + die("--password and --authfile options cannot be used at the same time");
116 ci->password = amqp_password;
[all …]
/openbmc/openbmc-test-automation/redfish/account_service/
H A Dtest_user_account.robot447 # Try to change to an invalid password.
451 # Change to a valid password.
553 # password The password to be assigned.
594 # password The password to be assigned.
613 [Arguments] ${username} ${password}
617 # password Login password.
634 # password The password to be assigned.
667 # password The password to be assigned.
672 # wrong_password Any invalid password.
694 # password The password to be assigned.
[all …]
/openbmc/openbmc-test-automation/ipmi/
H A Dtest_ipmi_user.robot131 ... password.
222 ... password.
349 # Set new password for root user.
433 ... or 20 char password option.
444 ... char password option.
574 # password The user password (e.g. "0penBmc", "0penBmc1", etc.).
599 Rprint Vars random_userid password
603 ... user set password ${random_userid} ${password} ${password_option}
681 [Arguments] ${username} ${password}
685 # password The user password (e.g. "0penBmc", "0penBmc1", etc.).
[all …]
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/
H A Dpython3-passlib_1.7.4.bb1 SUMMARY = "comprehensive password hashing framework supporting over 30 schemes"
3 Passlib is a password hashing library for Python 2 & 3, which provides cross-platform \
4 implementations of over 30 password hashing algorithms, as well as a framework for \
5 managing existing password hashes. It’s designed to be useful for a wide range of \
6 tasks, from verifying a hash found in /etc/shadow, to providing full-strength password \

12345678910>>...20