/openbmc/qemu/qga/ |
H A D | commands-windows-ssh.c | 137 static bool create_acl_user(PWindowsUserInfo userInfo, PACL *pACL, Error **errp) in create_acl_user() argument 145 bool converted = ConvertStringSidToSid(userInfo->SSID, &userPSID); in create_acl_user() 148 userInfo->username); in create_acl_user() 176 userInfo->username, setResult); in create_acl_user() 289 static bool create_acl(PWindowsUserInfo userInfo, PACL *pACL, Error **errp) in create_acl() argument 303 if (!userInfo->isAdmin) { in create_acl() 304 if (!create_acl_user(userInfo, pACL, errp)) { in create_acl() 323 static bool create_ssh_directory(WindowsUserInfo *userInfo, Error **errp) in create_ssh_directory() argument 329 if (!create_acl(userInfo, &pNewACL, errp)) { in create_ssh_directory() 355 BOOL created = CreateDirectory(userInfo->sshDirectory, &sAttr); in create_ssh_directory() [all …]
|
/openbmc/phosphor-host-ipmid/user_channel/ |
H A D | user_layer.cpp | 136 UserInfo* userInfo = getUserAccessObject().getUserInfo(userId); in ipmiUserCheckEnabled() local 137 state = userInfo->userEnabled; in ipmiUserCheckEnabled() 152 UserInfo* userInfo = getUserAccessObject().getUserInfo(userId); in ipmiUserGetPrivilegeAccess() local 153 privAccess.privilege = userInfo->userPrivAccess[chNum].privilege; in ipmiUserGetPrivilegeAccess() 154 privAccess.ipmiEnabled = userInfo->userPrivAccess[chNum].ipmiEnabled; in ipmiUserGetPrivilegeAccess() 156 userInfo->userPrivAccess[chNum].linkAuthEnabled; in ipmiUserGetPrivilegeAccess() 157 privAccess.accessCallback = userInfo->userPrivAccess[chNum].accessCallback; in ipmiUserGetPrivilegeAccess() 212 UserInfo* userInfo = getUserAccessObject().getUserInfo(userId); in ipmiUserGetUserPayloadAccess() local 215 userInfo->payloadAccess[chNum].stdPayloadEnables1; in ipmiUserGetUserPayloadAccess() 217 userInfo->payloadAccess[chNum].stdPayloadEnables2Reserved; in ipmiUserGetUserPayloadAccess() [all …]
|
H A D | user_mgmt.cpp | 480 void UserAccess::setUserInfo(const uint8_t userId, UserInfo* userInfo) in setUserInfo() argument 483 std::copy(reinterpret_cast<uint8_t*>(userInfo), in setUserInfo() 484 reinterpret_cast<uint8_t*>(userInfo) + sizeof(*userInfo), in setUserInfo() 803 UserInfo* userInfo = getUserInfo(userId); in setUserEnabledState() local 805 userName.assign(reinterpret_cast<char*>(userInfo->userName), 0, in setUserEnabledState() 812 if (userInfo->userEnabled != enabledState) in setUserEnabledState() 819 userInfo->userEnabled = enabledState; in setUserEnabledState() 855 UserInfo* userInfo = getUserInfo(userId); in setUserPayloadAccess() local 859 userInfo in setUserPayloadAccess() 900 UserInfo* userInfo = getUserInfo(userId); setUserPrivilegeAccess() local 975 UserInfo* userInfo = getUserInfo(userId); getUserName() local 1020 UserInfo* userInfo = getUserInfo(userId); setUserName() local 1183 readPayloadAccessFromUserInfo(const UserInfo & userInfo,std::array<std::array<bool,ipmiMaxChannels>,payloadsPerByte> & stdPayload,std::array<std::array<bool,ipmiMaxChannels>,payloadsPerByte> & oemPayload) readPayloadAccessFromUserInfo() argument 1204 updatePayloadAccessInUserInfo(const std::array<std::array<bool,ipmiMaxChannels>,payloadsPerByte> & stdPayload,const std::array<std::array<bool,ipmiMaxChannels>,payloadsPerByte> &,UserInfo & userInfo) updatePayloadAccessInUserInfo() argument 1245 Json userInfo = jsonUsersTbl[usrIndex - 1]; // json array starts with 0. readUserData() local [all...] |
H A D | user_mgmt.hpp | 199 void setUserInfo(const uint8_t userId, UserInfo* userInfo); 273 const UserInfo& userInfo, 295 UserInfo& userInfo);
|
/openbmc/webui-vue/src/views/Login/ |
H A D | Login.vue | 19 v-model="userInfo.username" 21 :state="getValidationState(v$.userInfo.username)" 25 @input="v$.userInfo.username.$touch()" 29 <template v-if="v$.userInfo.username.required.$invalid"> 39 v-model="userInfo.password" 41 :state="getValidationState(v$.userInfo.password)" 45 @input="v$.userInfo.password.$touch()" 49 <template v-if="v$.userInfo.password.required.$invalid"> 94 userInfo: { 117 userInfo: { [all …]
|
/openbmc/phosphor-user-manager/test/ |
H A D | user_mgr_test.cpp | 107 UserInfoMap userInfo; in TEST_F() local 111 EXPECT_THROW(userInfo = mockManager.getUserInfo(userName), in TEST_F() 117 UserInfoMap userInfo; in TEST_F() local 124 userInfo = mockManager.getUserInfo(userName); in TEST_F() 126 EXPECT_EQ(privilege, std::get<std::string>(userInfo["UserPrivilege"])); in TEST_F() 128 std::get<std::vector<std::string>>(userInfo["UserGroups"])); in TEST_F() 129 EXPECT_EQ(true, std::get<bool>(userInfo["UserEnabled"])); in TEST_F() 130 EXPECT_EQ(false, std::get<bool>(userInfo["UserLockedForFailedAttempt"])); in TEST_F() 131 EXPECT_EQ(false, std::get<bool>(userInfo["UserPasswordExpired"])); in TEST_F() 132 EXPECT_EQ(false, std::get<bool>(userInfo["RemoteUse in TEST_F() 137 UserInfoMap userInfo; TEST_F() local 159 UserInfoMap userInfo; TEST_F() local 692 UserInfoMap userInfo = getUserInfo(newUsername); TEST_F() local 717 UserInfoMap userInfo = getUserInfo(username); TEST_F() local 743 UserInfoMap userInfo = getUserInfo(username); TEST_F() local 891 UserInfoMap userInfo = getUserInfo(username); TEST_F() local 921 UserInfoMap userInfo = getUserInfo(username); TEST_F() local [all...] |
/openbmc/phosphor-user-manager/ |
H A D | user_mgr.cpp | 1198 UserInfoMap userInfo; in getUserInfo() local 1203 userInfo.emplace("UserPrivilege", user.get()->userPrivilege()); in getUserInfo() 1204 userInfo.emplace("UserGroups", user.get()->userGroups()); in getUserInfo() 1205 userInfo.emplace("UserEnabled", user.get()->userEnabled()); in getUserInfo() 1206 userInfo.emplace("UserLockedForFailedAttempt", in getUserInfo() 1208 userInfo.emplace("UserPasswordExpired", in getUserInfo() 1210 userInfo.emplace("TOTPSecretkeyRequired", in getUserInfo() 1212 userInfo.emplace("RemoteUser", false); in getUserInfo() 1242 return userInfo; in getUserInfo() 1286 userInfo in getUserInfo() [all...] |
/openbmc/qemu/ui/ |
H A D | cocoa.m | 337 …ventRef handleTapEvent(CGEventTapProxy proxy, CGEventType type, CGEventRef cgEvent, void *userInfo) 339 QemuCocoaView *view = userInfo; 367 userInfo:nil];
|