/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/ |
H A D | shadow-update-pam-conf.patch | 37 -password include system-auth 38 +password include common-password 47 -password include system-auth 48 +password include common-password 58 +password include common-password 68 +password include common-password 78 +password include common-password 88 +password include common-password 98 +password include common-password 108 +password include common-password [all …]
|
/openbmc/openbmc-test-automation/lib/ |
H A D | host.tcl | 46 proc get_host_domain {host username password {quiet 1}} { 64 "sshpass -p $password ssh -o StrictHostKeyChecking=no -k $username@$host\ 71 proc get_host_name_servers {host username password {quiet 1}} { 88 lassign [cmd_fnc "sshpass -p $password ssh -o StrictHostKeyChecking=no -k\ 97 proc get_host_mac_address {host username password {interface {}} {quiet 1}} { 119 $password $quiet] 120 lassign [cmd_fnc "sshpass -p $password ssh -o StrictHostKeyChecking=no -k\ 128 proc get_host_gateway {host username password {quiet 1}} { 153 proc get_host_default_interface {host username password {quiet 1} } { 178 proc get_host_netmask {host username password {interface {}} {quiet 1}} { [all …]
|
/openbmc/docs/designs/ |
H A D | expired-password.md | 20 system is accessible with a default password. 30 password) may be expired. 42 property which supports a password change dialog. 47 Note the terminology: An "expired password" is a special case of "password 70 to change the password). 110 and password) and the password needs to be changed the request will fail to 126 for the expired password dialog. 153 the BMC's initial expired password and password expired for another cause such 157 password change dialog for the signon screen. 161 expired password: [all …]
|
/openbmc/webui-vue/src/views/ChangePassword/ |
H A D | ChangePassword.vue | 2 <div class="change-password-container"> 16 label-for="password" 19 <input-password-toggle> 21 id="password" 24 type="password" 35 </input-password-toggle> 41 <input-password-toggle> 45 type="password" 98 password: null, 108 password: { required }, [all …]
|
/openbmc/webui-vue/src/views/Login/ |
H A D | Login.vue | 35 <label for="password">{{ $t('pageLogin.password') }}</label> 36 <input-password-toggle> 38 id="password" 39 v-model="userInfo.password" 42 type="password" 43 data-test-id="login-input-password" 45 @input="v$.userInfo.password.$touch()" 53 </input-password-toggle> 96 password: null, 121 password: { [all …]
|
/openbmc/openbmc-test-automation/security/ |
H A D | test_bmc_expire_password.robot | 58 # Change to a valid password. 67 [Documentation] Expire root password and update bad password via Redfish and expect an error. 91 # Change to a valid password. 130 # Change valid password. 138 # Verify valid password. 188 # verify new password 193 [Documentation] Force expire admin password and update admin password via GUI. 215 # Verify valid password. 338 # Expire the password. 342 Should Contain Any ${output} password expiry information changed password changed [all …]
|
/openbmc/openbmc/meta-google/recipes-extended/pam/ |
H A D | libpam_%.bbappend | 8 sed -i '/pam_pwquality.so/d' ${D}${sysconfdir}/pam.d/common-password 11 # with "password". This makes sure that if pam_pwquality.so was the first 14 # the user for a new password but use the one provided by the previously 15 # stacked password module". Since there is no "previous" entry, it never 16 # asks for a password which causes the process to fail. 17 awk '/^password/ && !f{sub(/ use_authtok/, ""); f=1} 1' \ 18 ${D}${sysconfdir}/pam.d/common-password \ 19 > ${D}${sysconfdir}/pam.d/common-password.new 20 mv ${D}${sysconfdir}/pam.d/common-password.new \ 21 ${D}${sysconfdir}/pam.d/common-password
|
/openbmc/ipmitool/lib/ |
H A D | ipmi_main.c | 508 if (password) { in ipmi_main() 509 free(password); in ipmi_main() 510 password = NULL; in ipmi_main() 524 if (password) { in ipmi_main() 525 free(password); in ipmi_main() 664 if (password) { in ipmi_main() 665 free(password); in ipmi_main() 680 if (password) { in ipmi_main() 691 if (password) { in ipmi_main() 1066 free(password); in ipmi_main() [all …]
|
H A D | ipmi_user.c | 206 if (password != NULL) { in _ipmi_set_user_password() 532 char *password = NULL; in ipmi_user_test() local 553 password = ask_password(user_id); in ipmi_user_test() 554 if (password == NULL) { in ipmi_user_test() 559 password = argv[3]; in ipmi_user_test() 563 password, in ipmi_user_test() 625 char *password = NULL; in ipmi_user_password() local 636 password = ask_password(user_id); in ipmi_user_password() 637 if (password == NULL) { in ipmi_user_password() 652 password = argv[3]; in ipmi_user_password() [all …]
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 293.out | 9 == adding a password to slot 4 == 10 == adding a password to slot 1 == 11 == adding a password to slot 3 == 12 == adding a password to slot 2 == 26 qemu-io: can't open: Invalid password, cannot unlock any keyslot 29 qemu-io: can't open: Invalid password, cannot unlock any keyslot 57 qemu-io: can't open: Invalid password, cannot unlock any keyslot 58 qemu-io: can't open: Invalid password, cannot unlock any keyslot 59 qemu-io: can't open: Invalid password, cannot unlock any keyslot 69 qemu-io: can't open: Invalid password, cannot unlock any keyslot [all …]
|
/openbmc/phosphor-webui/app/profile-settings/controllers/ |
H A D | profile-settings-controller.js | 19 $scope.password; 26 const updatePassword = function(password) { argument 28 APIUtils.updateUser($scope.username, null, password) 37 $scope.password = ''; 61 const password = form.password.$viewValue; 62 updatePassword(password);
|
/openbmc/webui-vue/src/views/SecurityAndAccess/UserManagement/ |
H A D | ModalUser.vue | 130 label-for="password" 140 <input-password-toggle> 142 id="password" 144 type="password" 175 <input-password-toggle> 180 type="password" 272 password: '', 316 password: { 343 userData.password = this.form.password; 357 userData.password = this.form.password; [all …]
|
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/ |
H A D | common-password | 2 # /etc/pam.d/common-password - password-related modules common to all services 16 password [success=ok default=die] pam_pwquality.so debug 17 password [success=ok default=die] pam_ipmicheck.so spec_grp_name=ipmi use_authtok 18 password [success=ok ignore=ignore default=die] pam_pwhistory.so debug use_authtok 19 password [success=ok default=die] pam_unix.so sha512 use_authtok 20 password [success=1 default=die] pam_ipmisave.so spec_grp_name=ipmi spec_pass_file=/etc/ipmi_pass … 22 password requisite pam_deny.so 26 password required pam_permit.so
|
/openbmc/linux/security/keys/encrypted-keys/ |
H A D | ecryptfs_format.c | 21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key() 57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok() 59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok() 67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok() 73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok() 74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
|
/openbmc/phosphor-webui/app/login/controllers/ |
H A D | login-controller.js | 24 $scope.tryLogin = function(host, username, password, event) { argument 28 $scope.login(host, username, password); 31 $scope.login = function(host, username, password) { argument 34 if (!username || username == '' || !password || password == '' || 39 userModel.login(username, password, function(status, description) {
|
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/ |
H A D | convert-pam-configs.sh | 12 pam_cracklib=$(grep "^password.*pam_cracklib.so" ${PAM_CONF_DIR}/common-password) 20 sed -i.bak -e "s/^password.*pam_cracklib.so.*/$pwquality/" ${PAM_CONF_DIR}/common-password 21 echo "# This file was converted by $0" >>${PAM_CONF_DIR}/common-password 25 pam_pwhistory=$(grep "^password.*pam_pwhistory.so.*remember" ${PAM_CONF_DIR}/common-password) 33 sed -i.bak -e "s/^password.*pam_pwhistory.so.*/$pwhistory/" ${PAM_CONF_DIR}/common-password 34 echo "# This file was converted by $0" >>${PAM_CONF_DIR}/common-password
|
/openbmc/openbmc/poky/bitbake/lib/hashserv/ |
H A D | client.py | 21 def __init__(self, username=None, password=None): argument 25 self.password = password 34 await self.auth(self.username, self.password) 151 self.password = token 165 self.password = result["token"] 231 def __init__(self, username=None, password=None): argument 233 self.password = password 266 return AsyncClient(self.username, self.password) 276 password=None, argument 282 self.password = password [all …]
|
/openbmc/openbmc-test-automation/gui/test/access_control/ |
H A D | test_obmc_gui_local_users.robot | 23 ${xpath_input_password} //input[@id="password"] 89 [Arguments] ${username} ${password} ${privilege}=Administrator 94 # password New user password. 99 Add User Details ${username} ${password} ${privilege} ${account_status} 103 [Arguments] ${username} ${password} ${privilege} ${account_status} 107 # password User password. 115 Input Password ${xpath_input_password} ${password} 116 Input Password ${xpath_confirm_password} ${password} 145 [Arguments] ${username} ${password} ${expected_result}=${True} 149 # password User password. [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/ |
H A D | 0007-greeter.c-support-to-update-expired-password.patch | 4 Subject: [PATCH 7/8] greeter.c: support to update expired password 6 Update greeter to work with ui to handle expired password. It checks 7 whether password is expired after input user and password. If expired, 8 force user to update password immediately. It allows 3 times to try. If 38 + gtk_label_set_text(GTK_LABEL(prompt), _("New password:")); 40 + gtk_label_set_text(GTK_LABEL(prompt), _("Retype new password:")); 83 + // if new password is same as old one 113 /* password check failed */ 153 + else if (!strncmp(str, "password-expire", 15)) 158 else if( !strncmp(str, "password", 8)) [all …]
|
/openbmc/openbmc/poky/bitbake/lib/layerindexlib/ |
H A D | restapi.py | 144 def _get_json_response(apiurl=None, username=None, password=None, retry=True): argument 152 password=up.password 160 … res = self.layerindex._fetch_url(up_stripped.geturl(), username=username, password=password) 167 … _get_json_response(apiurl=up_stripped.geturl(), username=username, password=password, retry=False) 197 … index.apilinks = _get_json_response(apiurl=url, username=up.username, password=up.password) 214 username=up.username, password=up.password) 226 username=up.username, password=up.password) 242 username=up.username, password=up.password) 263 username=up.username, password=up.password)
|
/openbmc/webui-vue/src/views/ProfileSettings/ |
H A D | ProfileSettings.vue | 31 <input-password-toggle> 33 id="old-password" 35 type="password" 39 </input-password-toggle> 54 <input-password-toggle> 56 id="password" 58 type="password" 80 </input-password-toggle> 87 <input-password-toggle> 91 type="password" [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/rabbitmq-c/files/ |
H A D | CVE-2023-35789.patch | 8 Subject: [PATCH] Add option to read username/password from file (#781) 10 * Add option to read username/password from file 26 +#define PASSWORDPREFIX "password:" 40 "the password to login with", "password"}, 44 + "path to file containing username/password for authentication", "file"}, 79 + die("Malformed auth file (missing password)"); 98 ci->password = NULL; 111 die("--password and --url options cannot be used at the same time"); 113 + die("--password and --authfile options cannot be used at the same time"); 116 ci->password = amqp_password; [all …]
|
/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_user_account.robot | 447 # Try to change to an invalid password. 451 # Change to a valid password. 553 # password The password to be assigned. 594 # password The password to be assigned. 613 [Arguments] ${username} ${password} 617 # password Login password. 634 # password The password to be assigned. 667 # password The password to be assigned. 672 # wrong_password Any invalid password. 694 # password The password to be assigned. [all …]
|
/openbmc/openbmc-test-automation/ipmi/ |
H A D | test_ipmi_user.robot | 131 ... password. 222 ... password. 349 # Set new password for root user. 433 ... or 20 char password option. 444 ... char password option. 574 # password The user password (e.g. "0penBmc", "0penBmc1", etc.). 599 Rprint Vars random_userid password 603 ... user set password ${random_userid} ${password} ${password_option} 681 [Arguments] ${username} ${password} 685 # password The user password (e.g. "0penBmc", "0penBmc1", etc.). [all …]
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/ |
H A D | python3-passlib_1.7.4.bb | 1 SUMMARY = "comprehensive password hashing framework supporting over 30 schemes" 3 Passlib is a password hashing library for Python 2 & 3, which provides cross-platform \ 4 implementations of over 30 password hashing algorithms, as well as a framework for \ 5 managing existing password hashes. It’s designed to be useful for a wide range of \ 6 tasks, from verifying a hash found in /etc/shadow, to providing full-strength password \
|