Home
last modified time | relevance | path

Searched full:valid (Results 1 – 25 of 2713) sorted by relevance

12345678910>>...109

/openbmc/qemu/tests/qemu-iotests/
H A D021.out5 -1 is not a valid pattern byte
8 -1 is not a valid pattern byte
11 -1 is not a valid pattern byte
14 -1 is not a valid pattern byte
17 -1 is not a valid pattern byte
20 -1 is not a valid pattern byte
23 300 is not a valid pattern byte
26 300 is not a valid pattern byte
29 300 is not a valid pattern byte
32 300 is not a valid pattern byte
[all …]
/openbmc/openbmc-test-automation/redfish/service_root/
H A Dtest_sessions_management.robot104 Valid Value session_service['@odata.id'] ['/redfish/v1/SessionService/']
105 Valid Value session_service['Description'] ['Session Service']
106 Valid Value session_service['Id'] ['SessionService']
107 Valid Value session_service['Name'] ['Session Service']
108 Valid Value session_service['ServiceEnabled'] [True]
109 Valid Value session_service['SessionTimeout'] [${Default_Timeout_Value}]
110 Valid Value session_service['Sessions']['@odata.id'] ['/redfish/v1/SessionService/Sessions']
121 Valid Value sessions['@odata.id'] ['/redfish/v1/SessionService/Sessions/']
122 Valid Value sessions['Description'] ['Session Collection']
123 Valid Value sessions['Name'] ['Session Collection']
[all …]
/openbmc/u-boot/fs/yaffs2/
H A Dyaffs_attribs.c103 unsigned int valid = attr->ia_valid; in yaffs_set_attribs() local
105 if (valid & ATTR_MODE) in yaffs_set_attribs()
107 if (valid & ATTR_UID) in yaffs_set_attribs()
109 if (valid & ATTR_GID) in yaffs_set_attribs()
112 if (valid & ATTR_ATIME) in yaffs_set_attribs()
114 if (valid & ATTR_CTIME) in yaffs_set_attribs()
116 if (valid & ATTR_MTIME) in yaffs_set_attribs()
119 if (valid & ATTR_SIZE) in yaffs_set_attribs()
130 unsigned int valid = 0; in yaffs_get_attribs() local
133 valid |= ATTR_MODE; in yaffs_get_attribs()
[all …]
/openbmc/openbmc-test-automation/redfish/managers/
H A Dtest_certificate.robot31 Server Valid Certificate Valid Privatekey ok
32 Server Empty Certificate Valid Privatekey error
33 Server Valid Certificate Empty Privatekey error
43 Client Valid Certificate Valid Privatekey ok
44 Client Empty Certificate Valid Privatekey error
45 Client Valid Certificate Empty Privatekey error
55 CA Valid Certificate ok
65 Client Valid Certificate Valid Privatekey ok
66 Client Empty Certificate Valid Privatekey error
67 Client Valid Certificate Empty Privatekey error
[all …]
/openbmc/openbmc-test-automation/ipmi/dcmi/
H A Dtest_dcmi_asset_tag.robot18 Set Asset Tag With Valid String Length
19 [Documentation] Set asset tag with valid string length and verify.
43 [Documentation] Set valid asset tag via IPMI and verify using Redfish.
50 Valid Value asset_tag ['${random_string}']
53 Set Asset Tag With Valid String Length Via DCMI Command
54 [Documentation] Set asset tag with valid string length and verify.
57 ${cmd_resp}= Set Valid Asset Tag
60 ... Valid Value cmd_resp_list[1] valid_values=['${number_of_bytes_to_write}']
79 Set Valid Asset Tag With DCMI And Verify With Redfish
80 [Documentation] Set valid asset tag via IPMI and verify using Redfish.
[all …]
/openbmc/u-boot/drivers/input/
H A Dkey_matrix.c23 * @param valid Number of valid keypresses to check
27 int valid) in has_ghosting() argument
32 if (!config->ghost_filter || valid < 3) in has_ghosting()
35 for (i = 0; i < valid; i++) { in has_ghosting()
40 for (j = i + 1; j < valid; j++) { in has_ghosting()
58 int valid, upto; in key_matrix_decode() local
63 for (valid = upto = 0; upto < num_keys; upto++) { in key_matrix_decode()
66 debug(" valid=%d, row=%d, col=%d\n", key->valid, key->row, in key_matrix_decode()
68 if (!key->valid) in key_matrix_decode()
75 if (valid < max_keycodes) in key_matrix_decode()
[all …]
/openbmc/openbmc-test-automation/ipmi/
H A Dtest_ipmi_sol.robot60 Set Valid SOL Privilege Level
61 [Documentation] Verify valid SOL's privilege level via IPMI.
169 Set Valid SOL Retry Count
170 [Documentation] Verify valid SOL's retry count via IPMI.
174 # Setting name Min valid value Max valid value
178 Set Valid SOL Retry Interval
179 [Documentation] Verify valid SOL's retry interval via IPMI.
183 # Setting name Min valid value Max valid valu
[all...]
H A Dtest_ipmi_network_configuration.robot48 Valid Value lan_print_output['IP Address'] ["${STATIC_IP}"]
49 Valid Value lan_print_output['Subnet Mask'] ["${NETMASK}"]
50 Valid Value lan_print_output['Default Gateway IP'] ["${GATEWAY}"]
86 Valid Value lan_config['802.1q VLAN ID'] ['Disabled']
99 Valid Value lan_config['802.1q VLAN ID'] ['${vlan_id_for_ipmi}']
100 Valid Value lan_config['IP Address'] ["${STATIC_IP}"]
111 Valid Value lan_config['802.1q VLAN ID'] ['${vlan_id_for_ipmi}']
121 Valid Value lan_config['802.1q VLAN ID'] ['${vlan_id_for_ipmi}']
122 Valid Value lan_config['IP Address'] ['${ip_address}']
123 Valid Value lan_config['Subnet Mask'] ['${subnet_mask}']
[all …]
H A Dtest_ipmi_general.robot48 Valid Value uuid ['${guids}']
88 Valid Value medium_type_ipmi_conf_map['${channel_info_ipmi['channel_0x${CHANNEL_NUMBER}_info']['channel_medium_type']}']
91 Valid Value protocol_type_ipmi_conf_map['${channel_info_ipmi['channel_0x${CHANNEL_NUMBER}_info']['channel_protocol_type']}']
94 Valid Value channel_info_ipmi['channel_0x${CHANNEL_NUMBER}_info']['session_support']
97 Valid Value channel_info_ipmi['channel_0x${CHANNEL_NUMBER}_info']['active_session_count']
100 Valid Value channel_info_ipmi['channel_0x${CHANNEL_NUMBER}_info']['protocol_vendor_id'] ['7154']
103 Valid Value disabled_ipmi_conf_map['${channel_info_ipmi['volatile(active)_settings']['alerting']}']
106 Valid Value disabled_ipmi_conf_map['${channel_info_ipmi['volatile(active)_settings']['per-message_auth']}']
109 Valid Value disabled_ipmi_conf_map['${channel_info_ipmi['volatile(active)_settings']['user_level_auth']}']
112 Valid Valu
[all...]
/openbmc/hiomapd/vpnor/
H A DREADME.md28 1. The FFS ToC defines the set of valid access ranges in terms of partitions
31 4. Read access to valid ranges must be granted
32 5. Write access to valid ranges may be granted
33 6. Access ranges that are valid may map into a backing file associated with the
35 7. A read of a valid access range that maps into the backing file will render
37 8. A read of a valid access range that does not map into the backing file will
40 10. A write to a valid access range that maps into the backing file will update
42 11. A write to a valid access range that does not map into the backing file will
44 12. A write to a valid access range may fail if the range is not marked as
/openbmc/phosphor-mboxd/vpnor/
H A DREADME.md32 1. The FFS ToC defines the set of valid access ranges in terms of partitions
35 4. Read access to valid ranges must be granted
36 5. Write access to valid ranges may be granted
37 6. Access ranges that are valid may map into a backing file associated with
39 7. A read of a valid access range that maps into the backing file will render
41 8. A read of a valid access range that does not map into the backing file will
44 10. A write to a valid access range that maps into the backing file will update
46 11. A write to a valid access range that does not map into the backing file
48 12. A write to a valid access range may fail if the range is not marked as
/openbmc/phosphor-dbus-interfaces/yaml/org/freedesktop/UPower/
H A DDevice.interface.yaml23 "The type of history. Valid types are rate or charge."
58 "The mode for the statistics. Valid types are charging or
136 property is only valid if the property type has the value
143 source. This property is only valid if the property type has the
150 considered to be empty. This property is only valid if the property
157 considered full. This property is only valid if the property type
164 hold when it's considered full. This property is only valid if the
172 charged. This property is only valid if the property type has the
189 to 0 if unknown. This property is only valid if the property type
196 to 0 if unknown. This property is only valid if the property type
[all …]
/openbmc/openbmc-test-automation/lib/
H A Dstate_map.py6 - Defines Valid states of the system
44 "Off": { # Valid states when Host is Off.
54 "Reboot": { # Valid states when BMC reset to standby.
64 "Running": { # Valid states when Host is powering on.
74 "Booted": { # Valid state when Host is booted.
84 "ResetReload": { # Valid state BMC reset reload when host is booted.
96 "Off": { # Valid states when Host is Off.
105 "Reboot": { # Valid states when BMC reset to standby.
114 "Running": { # Valid states when Host is powering on.
123 "Booted": { # Valid state when Host is booted.
[all …]
/openbmc/libcper/specification/document/
H A Dcper-json-specification.tex132 …Whether the "platformID" field in the header structure (\ref{section:headerstructure}) is valid. \\
134 … Whether the "timestamp" field in the header structure (\ref{section:headerstructure}) is valid. \\
136 …Whether the "partitionID" field in the header structure (\ref{section:headerstructure}) is valid.\\
172 ….fruIDValid & boolean & Whether the "fruID" field on this section descriptor contains valid data.\\
173 …ngValid & boolean & Whether the "fruString" field on this section descriptor contains valid data.\\
296 …eld of the Generic Processor Error section (\ref{section:genericprocessorerrorsection}) is valid.\\
298 …eld of the Generic Processor Error section (\ref{section:genericprocessorerrorsection}) is valid.\\
300 …eld of the Generic Processor Error section (\ref{section:genericprocessorerrorsection}) is valid.\\
302 …eld of the Generic Processor Error section (\ref{section:genericprocessorerrorsection}) is valid.\\
304 …eld of the Generic Processor Error section (\ref{section:genericprocessorerrorsection}) is valid.\\
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-kernel/kernel-selftest/kernel-selftest/
H A D0001-selftests-timers-Fix-clock_adjtime-for-newer-32-bit-.patch8 valid-adjtimex testcase fails to compile on such architectures.
16 tools/testing/selftests/timers/valid-adjtimex.c | 4 ++++
19 diff --git a/tools/testing/selftests/timers/valid-adjtimex.c b/tools/testing/selftests/timers/valid
21 --- a/tools/testing/selftests/timers/valid-adjtimex.c
22 +++ b/tools/testing/selftests/timers/valid-adjtimex.c
/openbmc/phosphor-bmc-code-mgmt/bmc/
H A Dimage_verify.cpp146 bool valid; in verify() local
163 valid = checkAndVerifyImage(imageDirPath, publicKeyFile, in verify()
165 if (bmcFilesFound && !valid) in verify()
170 if (!valid) in verify()
175 valid = checkAndVerifyImage(imageDirPath, publicKeyFile, in verify()
177 if (bmcFilesFound && !valid) in verify()
225 // Either BMC images or optional images shall be valid in verify()
226 assert(valid || optionalImagesValid); in verify()
262 auto valid = false; in systemLevelVerify() local
278 valid = verifyFile(manifestFile, manifestFileSig, in systemLevelVerify()
[all …]
/openbmc/bios-bmc-smm-error-logger/include/rde/
H A Drde_dictionary_manager.hpp27 DictionaryEntry(bool valid, const std::span<const uint8_t> data) : in DictionaryEntry()
28 valid(valid), data(data.begin(), data.end()) in DictionaryEntry()
31 bool valid; member
53 * @brief Set the dictionary valid status. Until this is called, dictionary
106 * @brief Set a dictionary entry to be invalid and reduce the valid
114 * @brief Set the dictionary entry valid flag and increase the valid
/openbmc/bios-bmc-smm-error-logger/src/rde/
H A Drde_dictionary_manager.cpp74 if (!itemIt->second->valid) in getDictionary()
101 element.second->valid = false; in invalidateDictionaries()
108 // If this is a valid entry, reduce the valid dictionary count. in invalidateDictionaryEntry()
109 if (entry.valid) in invalidateDictionaryEntry()
113 entry.valid = false; in invalidateDictionaryEntry()
118 if (!entry.valid) in validateDictionaryEntry()
122 entry.valid = true; in validateDictionaryEntry()
/openbmc/openbmc-test-automation/pldm/
H A Dtest_pldm_fru.robot31 Valid Value pldm_output['FRUDATAMajorVersion'] [1]
32 Valid Value pldm_output['FRUDATAMinorVersion'] [0]
33 Valid Value pldm_output['FRUTableMaximumSize'] [4294967295]
34 Valid Range pldm_output['FRUTableLength'] 1
35 Valid Range pldm_output['Total number of records in table'] 1
36 Valid Range pldm_output['Total number of Record Set Identifiers in table'] 1
/openbmc/u-boot/cmd/x86/
H A Dmtrr.c24 printf("Reg Valid Write-type %-16s %-16s %-16s\n", "Base ||", in do_mtrr_list()
29 bool valid; in do_mtrr_list() local
36 valid = mask & MTRR_PHYS_MASK_VALID; in do_mtrr_list()
39 valid ? "Y" : "N", type, base & ~MTRR_BASE_TYPE_MASK, in do_mtrr_list()
53 bool valid; in do_mtrr_set() local
69 valid = native_read_msr(MTRR_PHYS_MASK_MSR(reg)) & MTRR_PHYS_MASK_VALID; in do_mtrr_set()
72 if (valid) in do_mtrr_set()
84 static int mtrr_set_valid(int reg, bool valid) in mtrr_set_valid() argument
91 if (valid) in mtrr_set_valid()
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/
H A Dtest_certificates_sub_menu.robot49 Page should contain Valid from
50 Page should contain Valid until
87 Install And Verify Certificate Via Redfish CA Valid Certificate ok
100 Replace Certificate Via Redfish Server Valid Certificate Valid Privatekey ok
116 Install And Verify Certificate Via Redfish Client Valid Certificate Valid Privatekey ok
135 ${cert_file_path}= Generate Certificate File Via Openssl Valid Certificate Valid Privatekey
137 ${cert_file_path}= Generate Certificate File Via Openssl Valid Certificate
/openbmc/openbmc-test-automation/network/
H A Dtest_vlan_network.robot49 Valid Value lan_config['802.1q VLAN ID'] ["${vlan_id}"]
69 Valid Value lan_config['802.1q VLAN ID'] ["Disabled"]
82 Valid Value lan_config['IP Address'] ["${ip}"]
93 Valid Value lan_config['IP Address'] ["${ip}"]
112 Valid Value lan_config['IP Address'] ["${ip}"]
118 Valid Value lan_config['802.1q VLAN ID'] ["Disabled"]
130 Valid Value lan_config['IP Address'] ["${ip}"]
131 Valid Value lan_config['802.1q VLAN ID'] ["${vlan_id}"]
139 Valid Value lan_config['IP Address'] ["${ip}"]
140 Valid Value lan_config['802.1q VLAN ID'] ["${vlan_id}"]
[all …]
/openbmc/openbmc-test-automation/redfish/dmtf_tools/
H A Dtest_redfishtool_certificate.robot31 Verify Redfishtool Replace Server Certificate Valid CertKey
35 Verify Redfishtool Replace Certificate Server Valid Certificate Valid Privatekey ok
38 Verify Redfishtool Replace Client Certificate Valid CertKey
42 Verify Redfishtool Replace Certificate Client Valid Certificate Valid Privatekey ok
45 Verify Redfishtool Replace CA Certificate Valid Cert
49 Verify Redfishtool Replace Certificate CA Valid Certificate ok
52 Verify Redfishtool Client Certificate Install Valid CertKey
56 Verify Redfishtool Install Certificate Client Valid Certificate Valid Privatekey ok
59 Verify Redfishtool CA Certificate Install Valid Cert
63 Verify Redfishtool Install Certificate CA Valid Certificate ok
[all …]
/openbmc/u-boot/drivers/phy/marvell/
H A Dcomphy_mux.c15 * is valid for specific lane. If the type is not valid,
23 int lane, opt, valid; in comphy_mux_check_config() local
34 for (opt = 0, valid = 0; opt < mux_data->max_lane_values; in comphy_mux_check_config()
37 valid = 1; in comphy_mux_check_config()
41 if (valid == 0) { in comphy_mux_check_config()
128 /* check if the configuration is valid */ in comphy_mux_init()
/openbmc/qemu/bsd-user/
H A Dsignal-common.h49 * union in target_siginfo is valid. This only applies between
66 #define QEMU_SI_NOINFO 0 /* nothing other than si_signo valid */
67 #define QEMU_SI_FAULT 1 /* _fault is valid in _reason */
68 #define QEMU_SI_TIMER 2 /* _timer is valid in _reason */
69 #define QEMU_SI_MESGQ 3 /* _mesgq is valid in _reason */
70 #define QEMU_SI_POLL 4 /* _poll is valid in _reason */
72 #define QEMU_SI_CAPSICUM 5 /* _capsicum is valid in _reason */

12345678910>>...109