/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_redfish_privilege_registry.robot | 10 Suite Setup Create And Verify Various Privilege Users 31 Verify Redfish Privilege Registry Properties 32 [Documentation] Verify the Redfish Privilege Registry properties. 37 # Get the complete Privilege Registry URL 38 ${url}= Get Redfish Privilege Registry json URL 42 # Verify the Privilege Registry Resource. 45 # "Name": "Privilege Mapping array collection", 55 Should Be Equal As Strings ${resp.dict["Name"]} Privilege Mapping array collection 62 Verify Redfish Privilege Registry Mappings Properties For Account Service 63 [Documentation] Verify Privilege Registry Account Service Mappings resource properties. [all …]
|
H A D | test_ipmi_redfish_user.robot | 71 Update User Privilege Via Redfish And Verify Using IPMI 132 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 149 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 165 Update User Privilege To Operator Via IPMI And Verify Using Redfish 169 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 182 Update User Privilege To Readonly Via IPMI And Verify Using Redfish 187 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 205 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 247 Create IPMI User Without Any Privilege And Verify Via Redfish 251 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege [all …]
|
H A D | test_ldap_configuration.robot | 148 Verify LDAP User With Admin Privilege Able To Do BMC Reboot 162 Verify LDAP User With Operator Privilege Able To Do Host Poweroff 166 [Teardown] Restore LDAP Privilege 210 Verify LDAP User With Read Privilege Able To Check Inventory 214 [Teardown] Run Keywords FFDC On Test Case Fail AND Restore LDAP Privilege 215 [Template] Set Read Privilege And Check Firmware Inventory 220 Verify LDAP User With Read Privilege Should Not Do Host Poweron 224 [Teardown] Run Keywords FFDC On Test Case Fail AND Restore LDAP Privilege 225 [Template] Set Read Privilege And Check Poweron 235 [Teardown] Restore LDAP Privilege [all …]
|
/openbmc/phosphor-net-ipmid/ |
H A D | comm_module.cpp | 25 session::Privilege::HIGHEST_MATCHING, in sessionSetupCommands() 30 session::Privilege::HIGHEST_MATCHING, in sessionSetupCommands() 35 session::Privilege::HIGHEST_MATCHING, in sessionSetupCommands() 41 session::Privilege::HIGHEST_MATCHING, in sessionSetupCommands() 47 session::Privilege::HIGHEST_MATCHING, in sessionSetupCommands() 53 session::Privilege::USER, in sessionSetupCommands() 59 session::Privilege::CALLBACK, in sessionSetupCommands()
|
H A D | sol_module.cpp | 18 session::Privilege::HIGHEST_MATCHING, in registerCommands() 24 session::Privilege::USER, in registerCommands() 30 session::Privilege::USER, in registerCommands() 36 session::Privilege::USER, in registerCommands() 42 session::Privilege::USER, in registerCommands()
|
H A D | command_table.hpp | 56 session::Privilege privilege; 117 Entry(CommandID command, session::Privilege privilege) : in Entry() 155 session::Privilege privilege; 173 session::Privilege privilege, bool sessionless) : in NetIpmidEntry()
|
H A D | session.hpp | 32 enum class Privilege : uint8_t enum 122 reqMaxPrivLevel = static_cast<session::Privilege>(priv); in Session() 280 Privilege reqMaxPrivLevel;
|
/openbmc/phosphor-host-ipmid/ |
H A D | ipmid-new.cpp | 108 Privilege, HandlerBase::ptr /* handler */ 136 bool registerHandler(int prio, NetFn netFn, Cmd cmd, Privilege priv, in registerHandler() 161 bool registerGroupHandler(int prio, Group group, Cmd cmd, Privilege priv, in registerGroupHandler() 179 bool registerOemHandler(int prio, Iana iana, Cmd cmd, Privilege priv, in registerOemHandler() 261 if (request->ctx->priv < std::get<Privilege>(chosen)) in executeIpmiCommandCommon() 282 if (request->ctx->priv < std::get<Privilege>(chosen)) in executeIpmiCommandCommon() 500 Privilege privilege = Privilege::None; in executionEntry() 527 privilege = static_cast<Privilege>(std::get<int>(requestPriv)); in executionEntry() 545 privilege = Privilege::Admin; in executionEntry() 696 ipmi::Privilege realPriv; in ipmi_register_callback() [all …]
|
H A D | systemintfcmds.cpp | 157 ipmi::Privilege::Admin, ipmiAppReadEventBuffer); in registerNetFnAppFunctions() 162 ipmi::Privilege::Admin, ipmiAppSetBMCGlobalEnable); in registerNetFnAppFunctions() 167 ipmi::Privilege::User, ipmiAppGetBMCGlobalEnable); in registerNetFnAppFunctions() 171 ipmi::app::cmdGetMessageFlags, ipmi::Privilege::Admin, in registerNetFnAppFunctions()
|
H A D | storagehandler.cpp | 885 ipmi::storage::cmdGetSelInfo, ipmi::Privilege::User, in registerNetFnStorageFunctions() 891 ipmi::Privilege::User, in registerNetFnStorageFunctions() 901 ipmi::Privilege::Operator, deleteSELEntry); in registerNetFnStorageFunctions() 906 ipmi::Privilege::Operator, ipmiStorageAddSEL); in registerNetFnStorageFunctions() 910 ipmi::storage::cmdClearSel, ipmi::Privilege::Operator, in registerNetFnStorageFunctions() 916 ipmi::Privilege::User, ipmiStorageGetFruInvAreaInfo); in registerNetFnStorageFunctions() 921 ipmi::Privilege::Operator, ipmiStorageReadFruData); in registerNetFnStorageFunctions() 928 ipmi::Privilege::User, ipmiGetRepositoryInfo); in registerNetFnStorageFunctions() 933 ipmi::Privilege::User, ipmiSensorReserveSdr); in registerNetFnStorageFunctions() 945 ipmi::storage::cmdReserveSel, ipmi::Privilege::User, in registerNetFnStorageFunctions() [all …]
|
H A D | dcmihandler.cpp | 1178 ipmi::dcmi::cmdGetPowerLimit, ipmi::Privilege::User, in registerNetFnDcmiFunctions() 1184 ipmi::Privilege::Operator, setPowerLimit); in registerNetFnDcmiFunctions() 1189 ipmi::Privilege::Operator, applyPowerLimit); in registerNetFnDcmiFunctions() 1193 ipmi::dcmi::cmdGetAssetTag, ipmi::Privilege::User, in registerNetFnDcmiFunctions() 1198 ipmi::dcmi::cmdSetAssetTag, ipmi::Privilege::Operator, in registerNetFnDcmiFunctions() 1204 ipmi::Privilege::User, getMgmntCtrlIdStr); in registerNetFnDcmiFunctions() 1209 ipmi::Privilege::Admin, setMgmntCtrlIdStr); in registerNetFnDcmiFunctions() 1214 ipmi::Privilege::User, getDCMICapabilities); in registerNetFnDcmiFunctions() 1218 ipmi::dcmi::cmdGetPowerReading, ipmi::Privilege::User, in registerNetFnDcmiFunctions() 1227 ipmi::Privilege::Operator, getSensorInfo); in registerNetFnDcmiFunctions() [all …]
|
H A D | apphandler.cpp | 1792 ipmi::app::cmdGetDeviceId, ipmi::Privilege::User, in registerNetFnAppFunctions() 1798 ipmi::Privilege::User, ipmiAppGetBtCapabilities); in registerNetFnAppFunctions() 1803 ipmi::Privilege::Operator, ipmiAppResetWatchdogTimer); in registerNetFnAppFunctions() 1806 ipmi::app::cmdGetSessionInfo, ipmi::Privilege::User, in registerNetFnAppFunctions() 1812 ipmi::Privilege::Operator, ipmiSetWatchdogTimer); in registerNetFnAppFunctions() 1815 ipmi::app::cmdCloseSession, ipmi::Privilege::Callback, in registerNetFnAppFunctions() 1820 ipmi::app::cmdGetWatchdogTimer, ipmi::Privilege::User, in registerNetFnAppFunctions() 1826 ipmi::Privilege::User, ipmiAppGetSelfTestResults); in registerNetFnAppFunctions() 1830 ipmi::app::cmdGetDeviceGuid, ipmi::Privilege::User, in registerNetFnAppFunctions() 1836 ipmi::Privilege::Admin, ipmiSetAcpiPowerState); in registerNetFnAppFunctions() [all …]
|
/openbmc/fb-ipmi-oem/src/ |
H A D | biccommands.cpp | 396 ipmi::Privilege::User, ipmiOemBicHandler); in registerBICFunctions() 400 ipmi::Privilege::User, ipmiOemPostCodeHandler); in registerBICFunctions() 404 ipmi::Privilege::User, ipmiOemPostCodeHandler); in registerBICFunctions() 408 ipmi::Privilege::User, ipmiOemGetBicGpioState); in registerBICFunctions() 412 ipmi::Privilege::User, ipmiOemSetHostPowerState); in registerBICFunctions() 415 ipmi::Privilege::User, ipmiOemGetBiosFlashSize); in registerBICFunctions() 418 ipmi::Privilege::User, ipmiOemClearCmos); in registerBICFunctions()
|
/openbmc/phosphor-host-ipmid/user_channel/ |
H A D | usercommands.cpp | 646 ipmi::Privilege::Admin, ipmiSetUserAccess); in registerUserIpmiFunctions() 650 ipmi::Privilege::Admin, ipmiGetUserAccess); in registerUserIpmiFunctions() 654 ipmi::Privilege::Admin, ipmiGetUserName); in registerUserIpmiFunctions() 657 ipmi::app::cmdSetUserName, ipmi::Privilege::Admin, in registerUserIpmiFunctions() 662 ipmi::Privilege::Admin, ipmiSetUserPassword); in registerUserIpmiFunctions() 666 ipmi::Privilege::Callback, in registerUserIpmiFunctions() 671 ipmi::Privilege::Admin, ipmiSetUserPayloadAccess); in registerUserIpmiFunctions() 675 ipmi::Privilege::Operator, ipmiGetUserPayloadAccess); in registerUserIpmiFunctions()
|
H A D | channelcommands.cpp | 405 Privilege::Admin, ipmiSetChannelAccess); in registerChannelFunctions() 408 Privilege::User, ipmiGetChannelAccess); in registerChannelFunctions() 411 Privilege::User, ipmiGetChannelInfo); in registerChannelFunctions() 414 Privilege::User, ipmiGetChannelPayloadSupport); in registerChannelFunctions() 417 Privilege::User, ipmiGetChannelPayloadVersion); in registerChannelFunctions()
|
/openbmc/phosphor-net-ipmid/command/ |
H A D | open_session.cpp | 50 session::Privilege priv; in openSession() 59 priv = session::Privilege::ADMIN; in openSession() 63 priv = static_cast<session::Privilege>(request->maxPrivLevel); in openSession()
|
H A D | rakp12.cpp | 157 if (!(static_cast<session::Privilege>( in RAKP12() 159 session::Privilege::CALLBACK)) in RAKP12() 165 session->currentPrivilege(static_cast<uint8_t>(session::Privilege::USER)); in RAKP12() 168 static_cast<session::Privilege>(request->req_max_privilege_level); in RAKP12() 245 static_cast<uint8_t>(session::Privilege::OEM)) in RAKP12()
|
/openbmc/intel-ipmi-oem/src/ |
H A D | multinodecommands.cpp | 129 ipmi::Privilege::User, ipmiGetMultiNodePresence); in registerMultiNodeFunctions() 133 ipmi::Privilege::User, ipmiGetMultiNodeId); in registerMultiNodeFunctions() 137 ipmi::Privilege::User, ipmiGetMultiNodeRole); in registerMultiNodeFunctions()
|
H A D | smbiosmdrv2handler.cpp | 1276 ipmi::Privilege::Operator, mdr2AgentStatus); in register_netfn_smbiosmdrv2_functions() 1281 ipmi::Privilege::Operator, mdr2GetDir); in register_netfn_smbiosmdrv2_functions() 1286 ipmi::Privilege::Operator, mdr2SendDir); in register_netfn_smbiosmdrv2_functions() 1291 ipmi::Privilege::Operator, mdr2GetDataInfo); in register_netfn_smbiosmdrv2_functions() 1296 ipmi::Privilege::Operator, mdr2DataInfoOffer); in register_netfn_smbiosmdrv2_functions() 1301 ipmi::Privilege::Operator, mdr2SendDataInfo); in register_netfn_smbiosmdrv2_functions() 1306 ipmi::Privilege::Operator, mdr2GetDataBlock); in register_netfn_smbiosmdrv2_functions() 1311 ipmi::Privilege::Operator, mdr2SendDataBlock); in register_netfn_smbiosmdrv2_functions() 1316 ipmi::Privilege::Operator, mdr2LockData); in register_netfn_smbiosmdrv2_functions() 1321 ipmi::Privilege::Operator, mdr2UnlockData); in register_netfn_smbiosmdrv2_functions() [all …]
|
H A D | oemcommands.cpp | 3996 intel::general::cmdGetBmcVersionString, Privilege::User, in registerOEMFunctions() 4010 intel::general::cmdDisableBMCSystemReset, Privilege::Admin, in registerOEMFunctions() 4015 intel::general::cmdGetBMCResetDisables, Privilege::Admin, in registerOEMFunctions() 4022 intel::general::cmdGetOEMDeviceInfo, Privilege::User, in registerOEMFunctions() 4031 Privilege::Operator, ipmiOEMSendEmbeddedFwUpdStatus); in registerOEMFunctions() 4034 Privilege::Admin, ipmiOEMSlotIpmb); in registerOEMFunctions() 4046 Privilege::Callback, ipmiOEMSetUser2Activation); in registerOEMFunctions() 4050 Privilege::Callback, ipmiOEMSetSpecialUserPassword); in registerOEMFunctions() 4054 intel::general::cmdGetProcessorErrConfig, Privilege::User, in registerOEMFunctions() 4059 intel::general::cmdSetProcessorErrConfig, Privilege::Admin, in registerOEMFunctions() [all …]
|
H A D | firmware-update.cpp | 1706 ipmi::Privilege::Admin, ipmiGetFwVersionInfo); in registerFirmwareFunctions() 1711 ipmi::Privilege::Admin, ipmiGetFwSecurityVersionInfo); in registerFirmwareFunctions() 1716 ipmi::Privilege::Admin, ipmiGetFwRootCertData); in registerFirmwareFunctions() 1722 ipmi::Privilege::Admin, ipmiFirmwareMaxTransferSize); in registerFirmwareFunctions() 1727 ipmi::Privilege::Admin, ipmiGetBmcExecutionContext); in registerFirmwareFunctions() 1732 ipmi::Privilege::Admin, ipmiGetFwUpdateRandomNumber); in registerFirmwareFunctions() 1737 ipmi::Privilege::Admin, ipmiSetFirmwareUpdateMode); in registerFirmwareFunctions() 1742 ipmi::Privilege::Admin, ipmiExitFirmwareUpdateMode); in registerFirmwareFunctions() 1747 ipmi::Privilege::Admin, in registerFirmwareFunctions() 1753 ipmi::Privilege::Admin, ipmiGetFirmwareUpdateStatus); in registerFirmwareFunctions() [all …]
|
H A D | bridgingcommands.cpp | 257 if ((ctx->priv) != ipmi::Privilege::Admin) in handleIpmbChannel() 761 ipmi::Privilege::User, ipmiAppClearMessageFlags); in register_bridging_functions() 764 ipmi::app::cmdGetMessageFlags, ipmi::Privilege::User, in register_bridging_functions() 768 ipmi::app::cmdGetMessage, ipmi::Privilege::User, in register_bridging_functions() 772 ipmi::app::cmdSendMessage, ipmi::Privilege::User, in register_bridging_functions() 777 ipmi::Privilege::User, ipmiAppReadEventMessageBuffer); in register_bridging_functions()
|
/openbmc/phosphor-host-ipmid/include/ipmid/ |
H A D | handler.hpp | 549 bool registerHandler(int prio, NetFn netFn, Cmd cmd, Privilege priv, 551 bool registerGroupHandler(int prio, Group group, Cmd cmd, Privilege priv, 553 bool registerOemHandler(int prio, Iana iana, Cmd cmd, Privilege priv, 575 bool registerHandler(int prio, NetFn netFn, Cmd cmd, Privilege priv, in registerHandler() 614 void registerGroupHandler(int prio, Group group, Cmd cmd, Privilege priv, in registerGroupHandler() 649 void registerOemHandler(int prio, Iana iana, Cmd cmd, Privilege priv, in registerOemHandler()
|
/openbmc/openbmc-test-automation/ipmi/ |
H A D | test_ipmi_general.robot | 136 # Input Channel Privilege Level 163 Verify Set Session Privilege Level via IPMI Raw Command 167 [Template] Set Session Privilege Level And Verify 176 Verify Set Invalid Session Privilege Level Via IPMI Raw Command 179 [Template] Set Invalid Session Privilege Level And Verify 321 Set Session Privilege Level And Verify 326 # privilege_level Requested Privilege Level. 327 # expected_level New Privilege Level (or present level if ‘return present privilege level’ 335 Set Invalid Session Privilege Level And Verify 339 # privilege_level Requested Privilege Level. [all …]
|
/openbmc/phosphor-net-ipmid/sol/ |
H A D | sol_manager.hpp | 129 session::Privilege solMinPrivilege = session::Privilege::USER;
|