Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 468) sorted by relevance

12345678910>>...19

/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/
H A Dshadow-update-pam-conf.patch9 common-password and common-session.
12 See meta/recipes-extended/pam/libpam/pam.d/common-password
37 -password include system-auth
38 +password include common-password
47 -password include system-auth
48 +password include common-password
57 -password include system-auth
58 +password include common-password
67 -password include system-auth
68 +password include common-password
[all …]
/openbmc/docs/designs/
H A Dexpired-password.md11 OpenBMC has a default password, connects to the network via DHCP, and does not
12 have a mechanism to require administrators to change the BMC's password. This
19 password be changed on the initial signon. This reduces the time window when the
20 system is accessible with a default password.
26 1. Success, when the access credentials (such as username and password) are
30 password) may be expired.
32 account is valid except the account's password is expired (such as indicated
38 PasswordChangeRequired by implementing a "password change dialog".
42 PasswordChangeRequired property which supports a password change dialog.
47 Note the terminology: An "expired password" is a special case of "password
[all …]
/openbmc/openbmc-test-automation/lib/
H A Dhost.tcl46 proc get_host_domain {host username password {quiet 1}} {
64 "sshpass -p $password ssh -o StrictHostKeyChecking=no -k $username@$host\
71 proc get_host_name_servers {host username password {quiet 1}} {
88 lassign [cmd_fnc "sshpass -p $password ssh -o StrictHostKeyChecking=no -k\
97 proc get_host_mac_address {host username password {interface {}} {quiet 1}} {
119 $password $quiet]
120 lassign [cmd_fnc "sshpass -p $password ssh -o StrictHostKeyChecking=no -k\
128 proc get_host_gateway {host username password {quiet 1}} {
145 lassign [cmd_fnc "sshpass -p $password ssh -o StrictHostKeyChecking=no -k\
153 proc get_host_default_interface {host username password {quiet 1} } {
[all …]
/openbmc/webui-vue/src/views/ChangePassword/
H A DChangePassword.vue2 <div class="change-password-container">
16 label-for="password"
19 <input-password-toggle>
21 id="password"
22 v-model="form.password"
24 type="password"
25 :state="getValidationState(v$.form.password)"
27 @change="v$.form.password.$touch()"
31 <template v-if="v$.form.password.required.$invalid">
35 </input-password-toggle>
[all …]
/openbmc/webui-vue/src/views/Login/
H A DLogin.vue35 <label for="password">{{ $t('pageLogin.password') }}</label>
36 <input-password-toggle>
38 id="password"
39 v-model="userInfo.password"
40 aria-describedby="login-error-alert password-required"
41 :state="getValidationState(v$.userInfo.password)"
42 type="password"
43 data-test-id="login-input-password"
45 @input="v$.userInfo.password.$touch()"
48 <b-form-invalid-feedback id="password-required" role="alert">
[all …]
/openbmc/openbmc-test-automation/security/
H A Dtest_bmc_expire_password.robot2 Documentation Test root user expire password.
29 [Documentation] Expire root user password and expect an error while access via IPMI.
40 [Documentation] Expire root user password and expect an error while access via SSH.
52 [Documentation] Expire and change root user password and access via SSH.
60 # Change to a valid password.
64 # Verify login with the new password through SSH.
69 [Documentation] Expire root password and update bad password via Redfish and expect an error.
84 [Documentation] Expire and change root user password via Redfish and verify.
93 # Change to a valid password.
98 # Verify login with the new password.
[all …]
/openbmc/ipmitool/lib/
H A Dipmi_main.c392 char * password = NULL; in ipmi_main() local
508 if (password) { in ipmi_main()
509 free(password); in ipmi_main()
510 password = NULL; in ipmi_main()
512 password = ipmi_password_file_read(optarg); in ipmi_main()
513 if (password == NULL) in ipmi_main()
524 if (password) { in ipmi_main()
525 free(password); in ipmi_main()
526 password = NULL; in ipmi_main()
528 password = strdup(tmp_pass); in ipmi_main()
[all …]
H A Dipmi_user.c191 uint8_t operation, const char *password, in _ipmi_set_user_password() argument
206 if (password != NULL) { in _ipmi_set_user_password()
207 size_t copy_len = strlen(password); in _ipmi_set_user_password()
213 strncpy((char *)(data + 2), password, copy_len); in _ipmi_set_user_password()
397 const char *password, uint8_t is_twenty_byte_password) in ipmi_user_test_password() argument
401 IPMI_PASSWORD_TEST_PASSWORD, password, in ipmi_user_test_password()
532 char *password = NULL; in ipmi_user_test() local
553 password = ask_password(user_id); in ipmi_user_test()
554 if (password == NULL) { in ipmi_user_test()
559 password = argv[3]; in ipmi_user_test()
[all …]
/openbmc/openbmc/meta-google/recipes-extended/pam/
H A Dlibpam_%.bbappend8 sed -i '/pam_pwquality.so/d' ${D}${sysconfdir}/pam.d/common-password
11 # with "password". This makes sure that if pam_pwquality.so was the first
14 # the user for a new password but use the one provided by the previously
15 # stacked password module". Since there is no "previous" entry, it never
16 # asks for a password which causes the process to fail.
17 awk '/^password/ && !f{sub(/ use_authtok/, ""); f=1} 1' \
18 ${D}${sysconfdir}/pam.d/common-password \
19 > ${D}${sysconfdir}/pam.d/common-password.new
20 mv ${D}${sysconfdir}/pam.d/common-password.new \
21 ${D}${sysconfdir}/pam.d/common-password
/openbmc/qemu/tests/qemu-iotests/
H A D293.out9 == adding a password to slot 4 ==
10 == adding a password to slot 1 ==
11 == adding a password to slot 3 ==
12 == adding a password to slot 2 ==
26 qemu-io: can't open: Invalid password, cannot unlock any keyslot
29 qemu-io: can't open: Invalid password, cannot unlock any keyslot
54 qemu-img: All the active keyslots match the (old) password that was given and erasing them will era…
57 qemu-io: can't open: Invalid password, cannot unlock any keyslot
58 qemu-io: can't open: Invalid password, cannot unlock any keyslot
59 qemu-io: can't open: Invalid password, cannot unlock any keyslot
[all …]
/openbmc/webui-vue/src/views/SecurityAndAccess/UserManagement/
H A DModalUser.vue130 label-for="password"
132 <b-form-text id="password-help-block">
140 <input-password-toggle>
142 id="password"
143 v-model="form.password"
144 type="password"
145 data-test-id="userManagement-input-password"
146 aria-describedby="password-help-block"
147 :state="getValidationState(v$.form.password)"
149 @input="v$.form.password.$touch()"
[all …]
/openbmc/phosphor-webui/app/profile-settings/controllers/
H A Dprofile-settings-controller.js19 $scope.password;
26 const updatePassword = function(password) { argument
28 APIUtils.updateUser($scope.username, null, password)
37 $scope.password = '';
61 const password = form.password.$viewValue;
62 updatePassword(password);
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/
H A Dcommon-password2 # /etc/pam.d/common-password - password-related modules common to all services
16 password [success=ok default=die] pam_pwquality.so debug
17 password [success=ok default=die] pam_ipmicheck.so spec_grp_name=ipmi use_authtok
18 password [success=ok ignore=ignore default=die] pam_pwhistory.so debug use_authtok
19 password [success=ok default=die] pam_unix.so sha512 use_authtok
20 password [success=1 default=die] pam_ipmisave.so spec_grp_name=ipmi spec_pass_file=/etc/ipmi_pass …
22 password requisite pam_deny.so
26 password required pam_permit.so
/openbmc/openbmc-test-automation/gui/test/access_control/
H A Dtest_obmc_gui_local_users.robot23 ${xpath_input_password} //input[@id="password"]
89 [Arguments] ${username} ${password} ${privilege}=Administrator
94 # password New user password.
99 Add User Details ${username} ${password} ${privilege} ${account_status}
103 [Arguments] ${username} ${password} ${privilege} ${account_status}
107 # password User password.
115 Input Password ${xpath_input_password} ${password}
116 Input Password ${xpath_confirm_password} ${password}
145 [Arguments] ${username} ${password} ${expected_result}=${True}
149 # password User password.
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/
H A D0007-greeter.c-support-to-update-expired-password.patch4 Subject: [PATCH 7/8] greeter.c: support to update expired password
6 Update greeter to work with ui to handle expired password. It checks
7 whether password is expired after input user and password. If expired,
8 force user to update password immediately. It allows 3 times to try. If
38 + gtk_label_set_text(GTK_LABEL(prompt), _("New password:"));
40 + gtk_label_set_text(GTK_LABEL(prompt), _("Retype new password:"));
83 + // if new password is same as old one
97 + printf("update-new-password user=%s newpass=%s session=%s lang=%s\n",
113 /* password check failed */
153 + else if (!strncmp(str, "password-expire", 15))
[all …]
H A D0005-ui.c-handle-password-expire-and-update-new-password.patch4 Subject: [PATCH 5/8] ui.c: handle password-expire and update-new-password
22 + xwrite(greeter_pipe[0], "password-expire\n", 16);
31 + else if (!strncmp(str, "update-new-password", 19)) {
32 + xwrite(greeter_pipe[0], "update-new-password\n", 20);
40 + xwrite(greeter_pipe[0], "invalid-new-password\n", 21);
/openbmc/linux/security/keys/encrypted-keys/
H A Decryptfs_format.c21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key()
57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok()
59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok()
67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok()
73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok()
74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
/openbmc/webui-vue/src/views/ProfileSettings/
H A DProfileSettings.vue31 <input-password-toggle>
33 id="old-password"
35 type="password"
39 </input-password-toggle>
46 <b-form-text id="password-help-block">
54 <input-password-toggle>
56 id="password"
58 type="password"
59 aria-describedby="password-help-block"
80 </input-password-toggle>
[all …]
/openbmc/openbmc/poky/bitbake/lib/layerindexlib/
H A Drestapi.py144 def _get_json_response(apiurl=None, username=None, password=None, retry=True): argument
152 password=up.password
160 … res = self.layerindex._fetch_url(up_stripped.geturl(), username=username, password=password)
167 … _get_json_response(apiurl=up_stripped.geturl(), username=username, password=password, retry=False)
197 … index.apilinks = _get_json_response(apiurl=url, username=up.username, password=up.password)
214 username=up.username, password=up.password)
226 username=up.username, password=up.password)
242 username=up.username, password=up.password)
263 username=up.username, password=up.password)
/openbmc/phosphor-webui/app/login/controllers/
H A Dlogin-controller.js24 $scope.tryLogin = function(host, username, password, event) { argument
28 $scope.login(host, username, password);
31 $scope.login = function(host, username, password) { argument
34 if (!username || username == '' || !password || password == '' ||
39 userModel.login(username, password, function(status, description) {
/openbmc/openbmc-test-automation/ipmi/
H A Dtest_ipmi_user.robot71 ... user set password ${random_userid} ${valid_password}
131 ... password.
139 # Set invalid password for newly created user.
141 ... user set password ${random_userid} ${invalid_password}
143 # Delay added for user password to get set.
154 # Set invalid password for newly created user.
162 [Documentation] Verify IPMI user password using test command.
170 # Set valid password for newly created user.
172 ... user set password ${random_userid} ${valid_password}
174 # Verify newly set password using test command.
[all …]
/openbmc/openbmc-test-automation/redfish/account_service/
H A Dtest_user_account.robot81 #username password role_id enabled
90 #username password role_id enabled
99 #username password role_id enabled
104 [Documentation] Verify Redfish admin user with wrong password.
108 #username password role_id enabled wrong_password
113 [Documentation] Verify Redfish operator user with wrong password.
117 #username password role_id enabled wrong_password
122 [Documentation] Verify Redfish readonly user with wrong password.
126 #username password role_id enabled wrong_password
135 #username password role_id enabled
[all …]
/openbmc/estoraged/src/
H A Destoraged.cpp61 "FormatLuks", [this](const std::vector<uint8_t>& password, in EStoraged()
63 this->formatLuks(password, type); in EStoraged()
71 [this](std::vector<uint8_t>& password) { this->unlock(password); }); in EStoraged() argument
160 void EStoraged::formatLuks(const std::vector<uint8_t>& password, in formatLuks() argument
173 formatLuksDev(password); in formatLuks()
174 activateLuksDev(password); in formatLuks()
251 void EStoraged::unlock(std::vector<uint8_t> password) in unlock() argument
256 activateLuksDev(std::move(password)); in unlock()
310 void EStoraged::formatLuksDev(std::vector<uint8_t> password) in formatLuksDev() argument
344 reinterpret_cast<const char*>(password.data()), password.size()); in formatLuksDev()
[all …]
/openbmc/linux/Documentation/ABI/testing/
H A Dsysfs-class-firmware-attributes159 For example a "BIOS Admin" password and "System" Password can be set,
162 - An "Admin" password is used for preventing modification to the BIOS
164 - A "System" password is required to boot a machine.
180 Representing BIOS administrator password
182 Representing a password required to use
185 Representing System Management password.
188 Representing HDD password
191 Representing NVMe password
196 Only supported type currently is "password".
208 setting attributes when a system or admin password is set
[all …]
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/
H A Dpython3-passlib_1.7.4.bb1 SUMMARY = "comprehensive password hashing framework supporting over 30 schemes"
3 Passlib is a password hashing library for Python 2 & 3, which provides cross-platform \
4 implementations of over 30 password hashing algorithms, as well as a framework for \
5 managing existing password hashes. It’s designed to be useful for a wide range of \
6 tasks, from verifying a hash found in /etc/shadow, to providing full-strength password \

12345678910>>...19