/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/ |
H A D | shadow-update-pam-conf.patch | 9 common-password and common-session. 12 See meta/recipes-extended/pam/libpam/pam.d/common-password 37 -password include system-auth 38 +password include common-password 47 -password include system-auth 48 +password include common-password 57 -password include system-auth 58 +password include common-password 67 -password include system-auth 68 +password include common-password [all …]
|
/openbmc/docs/designs/ |
H A D | expired-password.md | 11 OpenBMC has a default password, connects to the network via DHCP, and does not 12 have a mechanism to require administrators to change the BMC's password. This 19 password be changed on the initial signon. This reduces the time window when the 20 system is accessible with a default password. 26 1. Success, when the access credentials (such as username and password) are 30 password) may be expired. 32 account is valid except the account's password is expired (such as indicated 38 PasswordChangeRequired by implementing a "password change dialog". 42 PasswordChangeRequired property which supports a password change dialog. 47 Note the terminology: An "expired password" is a special case of "password [all …]
|
/openbmc/openbmc-test-automation/lib/ |
H A D | host.tcl | 46 proc get_host_domain {host username password {quiet 1}} { 64 "sshpass -p $password ssh -o StrictHostKeyChecking=no -k $username@$host\ 71 proc get_host_name_servers {host username password {quiet 1}} { 88 lassign [cmd_fnc "sshpass -p $password ssh -o StrictHostKeyChecking=no -k\ 97 proc get_host_mac_address {host username password {interface {}} {quiet 1}} { 119 $password $quiet] 120 lassign [cmd_fnc "sshpass -p $password ssh -o StrictHostKeyChecking=no -k\ 128 proc get_host_gateway {host username password {quiet 1}} { 145 lassign [cmd_fnc "sshpass -p $password ssh -o StrictHostKeyChecking=no -k\ 153 proc get_host_default_interface {host username password {quiet 1} } { [all …]
|
/openbmc/webui-vue/src/views/ChangePassword/ |
H A D | ChangePassword.vue | 2 <div class="change-password-container"> 16 label-for="password" 19 <input-password-toggle> 21 id="password" 22 v-model="form.password" 24 type="password" 25 :state="getValidationState(v$.form.password)" 27 @change="v$.form.password.$touch()" 31 <template v-if="v$.form.password.required.$invalid"> 35 </input-password-toggle> [all …]
|
/openbmc/webui-vue/src/views/Login/ |
H A D | Login.vue | 35 <label for="password">{{ $t('pageLogin.password') }}</label> 36 <input-password-toggle> 38 id="password" 39 v-model="userInfo.password" 40 aria-describedby="login-error-alert password-required" 41 :state="getValidationState(v$.userInfo.password)" 42 type="password" 43 data-test-id="login-input-password" 45 @input="v$.userInfo.password.$touch()" 48 <b-form-invalid-feedback id="password-required" role="alert"> [all …]
|
/openbmc/openbmc-test-automation/security/ |
H A D | test_bmc_expire_password.robot | 2 Documentation Test root user expire password. 29 [Documentation] Expire root user password and expect an error while access via IPMI. 40 [Documentation] Expire root user password and expect an error while access via SSH. 52 [Documentation] Expire and change root user password and access via SSH. 60 # Change to a valid password. 64 # Verify login with the new password through SSH. 69 [Documentation] Expire root password and update bad password via Redfish and expect an error. 84 [Documentation] Expire and change root user password via Redfish and verify. 93 # Change to a valid password. 98 # Verify login with the new password. [all …]
|
/openbmc/ipmitool/lib/ |
H A D | ipmi_main.c | 392 char * password = NULL; in ipmi_main() local 508 if (password) { in ipmi_main() 509 free(password); in ipmi_main() 510 password = NULL; in ipmi_main() 512 password = ipmi_password_file_read(optarg); in ipmi_main() 513 if (password == NULL) in ipmi_main() 524 if (password) { in ipmi_main() 525 free(password); in ipmi_main() 526 password = NULL; in ipmi_main() 528 password = strdup(tmp_pass); in ipmi_main() [all …]
|
H A D | ipmi_user.c | 191 uint8_t operation, const char *password, in _ipmi_set_user_password() argument 206 if (password != NULL) { in _ipmi_set_user_password() 207 size_t copy_len = strlen(password); in _ipmi_set_user_password() 213 strncpy((char *)(data + 2), password, copy_len); in _ipmi_set_user_password() 397 const char *password, uint8_t is_twenty_byte_password) in ipmi_user_test_password() argument 401 IPMI_PASSWORD_TEST_PASSWORD, password, in ipmi_user_test_password() 532 char *password = NULL; in ipmi_user_test() local 553 password = ask_password(user_id); in ipmi_user_test() 554 if (password == NULL) { in ipmi_user_test() 559 password = argv[3]; in ipmi_user_test() [all …]
|
/openbmc/openbmc/meta-google/recipes-extended/pam/ |
H A D | libpam_%.bbappend | 8 sed -i '/pam_pwquality.so/d' ${D}${sysconfdir}/pam.d/common-password 11 # with "password". This makes sure that if pam_pwquality.so was the first 14 # the user for a new password but use the one provided by the previously 15 # stacked password module". Since there is no "previous" entry, it never 16 # asks for a password which causes the process to fail. 17 awk '/^password/ && !f{sub(/ use_authtok/, ""); f=1} 1' \ 18 ${D}${sysconfdir}/pam.d/common-password \ 19 > ${D}${sysconfdir}/pam.d/common-password.new 20 mv ${D}${sysconfdir}/pam.d/common-password.new \ 21 ${D}${sysconfdir}/pam.d/common-password
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 293.out | 9 == adding a password to slot 4 == 10 == adding a password to slot 1 == 11 == adding a password to slot 3 == 12 == adding a password to slot 2 == 26 qemu-io: can't open: Invalid password, cannot unlock any keyslot 29 qemu-io: can't open: Invalid password, cannot unlock any keyslot 54 qemu-img: All the active keyslots match the (old) password that was given and erasing them will era… 57 qemu-io: can't open: Invalid password, cannot unlock any keyslot 58 qemu-io: can't open: Invalid password, cannot unlock any keyslot 59 qemu-io: can't open: Invalid password, cannot unlock any keyslot [all …]
|
/openbmc/webui-vue/src/views/SecurityAndAccess/UserManagement/ |
H A D | ModalUser.vue | 130 label-for="password" 132 <b-form-text id="password-help-block"> 140 <input-password-toggle> 142 id="password" 143 v-model="form.password" 144 type="password" 145 data-test-id="userManagement-input-password" 146 aria-describedby="password-help-block" 147 :state="getValidationState(v$.form.password)" 149 @input="v$.form.password.$touch()" [all …]
|
/openbmc/phosphor-webui/app/profile-settings/controllers/ |
H A D | profile-settings-controller.js | 19 $scope.password; 26 const updatePassword = function(password) { argument 28 APIUtils.updateUser($scope.username, null, password) 37 $scope.password = ''; 61 const password = form.password.$viewValue; 62 updatePassword(password);
|
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/ |
H A D | common-password | 2 # /etc/pam.d/common-password - password-related modules common to all services 16 password [success=ok default=die] pam_pwquality.so debug 17 password [success=ok default=die] pam_ipmicheck.so spec_grp_name=ipmi use_authtok 18 password [success=ok ignore=ignore default=die] pam_pwhistory.so debug use_authtok 19 password [success=ok default=die] pam_unix.so sha512 use_authtok 20 password [success=1 default=die] pam_ipmisave.so spec_grp_name=ipmi spec_pass_file=/etc/ipmi_pass … 22 password requisite pam_deny.so 26 password required pam_permit.so
|
/openbmc/openbmc-test-automation/gui/test/access_control/ |
H A D | test_obmc_gui_local_users.robot | 23 ${xpath_input_password} //input[@id="password"] 89 [Arguments] ${username} ${password} ${privilege}=Administrator 94 # password New user password. 99 Add User Details ${username} ${password} ${privilege} ${account_status} 103 [Arguments] ${username} ${password} ${privilege} ${account_status} 107 # password User password. 115 Input Password ${xpath_input_password} ${password} 116 Input Password ${xpath_confirm_password} ${password} 145 [Arguments] ${username} ${password} ${expected_result}=${True} 149 # password User password. [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/ |
H A D | 0007-greeter.c-support-to-update-expired-password.patch | 4 Subject: [PATCH 7/8] greeter.c: support to update expired password 6 Update greeter to work with ui to handle expired password. It checks 7 whether password is expired after input user and password. If expired, 8 force user to update password immediately. It allows 3 times to try. If 38 + gtk_label_set_text(GTK_LABEL(prompt), _("New password:")); 40 + gtk_label_set_text(GTK_LABEL(prompt), _("Retype new password:")); 83 + // if new password is same as old one 97 + printf("update-new-password user=%s newpass=%s session=%s lang=%s\n", 113 /* password check failed */ 153 + else if (!strncmp(str, "password-expire", 15)) [all …]
|
H A D | 0005-ui.c-handle-password-expire-and-update-new-password.patch | 4 Subject: [PATCH 5/8] ui.c: handle password-expire and update-new-password 22 + xwrite(greeter_pipe[0], "password-expire\n", 16); 31 + else if (!strncmp(str, "update-new-password", 19)) { 32 + xwrite(greeter_pipe[0], "update-new-password\n", 20); 40 + xwrite(greeter_pipe[0], "invalid-new-password\n", 21);
|
/openbmc/linux/security/keys/encrypted-keys/ |
H A D | ecryptfs_format.c | 21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key() 57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok() 59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok() 67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok() 73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok() 74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
|
/openbmc/webui-vue/src/views/ProfileSettings/ |
H A D | ProfileSettings.vue | 31 <input-password-toggle> 33 id="old-password" 35 type="password" 39 </input-password-toggle> 46 <b-form-text id="password-help-block"> 54 <input-password-toggle> 56 id="password" 58 type="password" 59 aria-describedby="password-help-block" 80 </input-password-toggle> [all …]
|
/openbmc/openbmc/poky/bitbake/lib/layerindexlib/ |
H A D | restapi.py | 144 def _get_json_response(apiurl=None, username=None, password=None, retry=True): argument 152 password=up.password 160 … res = self.layerindex._fetch_url(up_stripped.geturl(), username=username, password=password) 167 … _get_json_response(apiurl=up_stripped.geturl(), username=username, password=password, retry=False) 197 … index.apilinks = _get_json_response(apiurl=url, username=up.username, password=up.password) 214 username=up.username, password=up.password) 226 username=up.username, password=up.password) 242 username=up.username, password=up.password) 263 username=up.username, password=up.password)
|
/openbmc/phosphor-webui/app/login/controllers/ |
H A D | login-controller.js | 24 $scope.tryLogin = function(host, username, password, event) { argument 28 $scope.login(host, username, password); 31 $scope.login = function(host, username, password) { argument 34 if (!username || username == '' || !password || password == '' || 39 userModel.login(username, password, function(status, description) {
|
/openbmc/openbmc-test-automation/ipmi/ |
H A D | test_ipmi_user.robot | 71 ... user set password ${random_userid} ${valid_password} 131 ... password. 139 # Set invalid password for newly created user. 141 ... user set password ${random_userid} ${invalid_password} 143 # Delay added for user password to get set. 154 # Set invalid password for newly created user. 162 [Documentation] Verify IPMI user password using test command. 170 # Set valid password for newly created user. 172 ... user set password ${random_userid} ${valid_password} 174 # Verify newly set password using test command. [all …]
|
/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_user_account.robot | 81 #username password role_id enabled 90 #username password role_id enabled 99 #username password role_id enabled 104 [Documentation] Verify Redfish admin user with wrong password. 108 #username password role_id enabled wrong_password 113 [Documentation] Verify Redfish operator user with wrong password. 117 #username password role_id enabled wrong_password 122 [Documentation] Verify Redfish readonly user with wrong password. 126 #username password role_id enabled wrong_password 135 #username password role_id enabled [all …]
|
/openbmc/estoraged/src/ |
H A D | estoraged.cpp | 61 "FormatLuks", [this](const std::vector<uint8_t>& password, in EStoraged() 63 this->formatLuks(password, type); in EStoraged() 71 [this](std::vector<uint8_t>& password) { this->unlock(password); }); in EStoraged() argument 160 void EStoraged::formatLuks(const std::vector<uint8_t>& password, in formatLuks() argument 173 formatLuksDev(password); in formatLuks() 174 activateLuksDev(password); in formatLuks() 251 void EStoraged::unlock(std::vector<uint8_t> password) in unlock() argument 256 activateLuksDev(std::move(password)); in unlock() 310 void EStoraged::formatLuksDev(std::vector<uint8_t> password) in formatLuksDev() argument 344 reinterpret_cast<const char*>(password.data()), password.size()); in formatLuksDev() [all …]
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-class-firmware-attributes | 159 For example a "BIOS Admin" password and "System" Password can be set, 162 - An "Admin" password is used for preventing modification to the BIOS 164 - A "System" password is required to boot a machine. 180 Representing BIOS administrator password 182 Representing a password required to use 185 Representing System Management password. 188 Representing HDD password 191 Representing NVMe password 196 Only supported type currently is "password". 208 setting attributes when a system or admin password is set [all …]
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/ |
H A D | python3-passlib_1.7.4.bb | 1 SUMMARY = "comprehensive password hashing framework supporting over 30 schemes" 3 Passlib is a password hashing library for Python 2 & 3, which provides cross-platform \ 4 implementations of over 30 password hashing algorithms, as well as a framework for \ 5 managing existing password hashes. It’s designed to be useful for a wide range of \ 6 tasks, from verifying a hash found in /etc/shadow, to providing full-strength password \
|