| /openbmc/docs/designs/ |
| H A D | expired-password.md | 1 # Initial expired passwords 30 password) may be expired. 32 account is valid except the account's password is expired (such as indicated 47 Note the terminology: An "expired password" is a special case of "password 54 credentials, whether or not those credentials have expired and must be 67 - The BMC's initial password must be expired when the new EXPIRED_PASSWORD image 69 - An account with an expired password must not be allowed to use the BMC (except 71 - There must be a way to change the expired password using a supported 92 enabled, the BMC's default password will initially be expired as if via the 94 and is not based on time. An account with an expired password is neither [all …]
|
| /openbmc/bmcweb/redfish-core/include/registries/ |
| H A D | license_message_registry.hpp | 56 "Expired", 58 "Indicates that a license has expired and its functionality was disabled.", 59 "The license '%1' has expired.", 70 "Indicates that a license has expired and entered its grace period.", 71 … "The license '%1' has expired, %2 day grace period before licensed functionality is disabled.", 140 expired = 1, enumerator
|
| /openbmc/openbmc/poky/meta/recipes-support/ca-certificates/ca-certificates/ |
| H A D | 0001-Revert-mozilla-certdata2pem.py-print-a-warning-for-e.patch | 4 Subject: [PATCH] Revert "mozilla/certdata2pem.py: print a warning for expired 8 for expired certs (which is upstream concern, but not ours). 25 * Blacklist expired root certificate "DST Root CA X3" (closes: #995432) 26 - * mozilla/certdata2pem.py: print a warning for expired certificates. 72 - print('Trusted but expired certificate found: %s' % obj['CKA_LABEL'])
|
| /openbmc/sdbusplus/include/sdbusplus/ |
| H A D | timer.hpp | 32 event(nullptr), eventSource(nullptr), expired(false), in Timer() 48 event(event), eventSource(nullptr), expired(false), in Timer() 76 return expired; in isExpired() 96 expired = false; in start() 141 /** @brief Returns if the associated timer is expired 145 bool expired; member in sdbusplus::Timer 223 expired = true; in timeoutHandler()
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/ |
| H A D | 0003-check-whether-password-expired-with-pam.patch | 4 Subject: [PATCH 3/8] check whether password expired with pam 7 password is expired, return it. Only work with pam. 38 + g_debug("user %s account has expired\n", user);
|
| H A D | 0007-greeter.c-support-to-update-expired-password.patch | 4 Subject: [PATCH 7/8] greeter.c: support to update expired password 6 Update greeter to work with ui to handle expired password. It checks 7 whether password is expired after input user and password. If expired,
|
| /openbmc/sdeventplus/src/sdeventplus/utility/ |
| H A D | timer.hpp | 28 * timer tracks whether or not it has expired since creation or since 105 /** @brief Has the timer expired since creation or reset of expiration 108 * @return True if expired, false otherwise 165 /** @brief Resets the expired status of the timer. */ 169 * re-initialized. Expired status is reset, interval is updated, 179 * re-initialized. Expired status is reset, interval is removed, 212 bool expired; member in sdeventplus::utility::detail::TimerData
|
| H A D | timer.cpp | 68 return userdata->expired; in hasExpired() 133 userdata->expired = false; in clearExpired() 162 userdata->expired = true; in internalCallback() 192 Timer<Id>(base, sdeventplus::internal::NoOwn()), expired(false), in TimerData()
|
| /openbmc/openbmc-test-automation/security/ |
| H A D | test_bmc_expire_password.robot | 92 Verify User Password Expired Using Redfish ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} 102 Verify Error While Creating User With Expired Password 110 Verify User Password Expired Using Redfish ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} 205 # Verify that admin user should not be able to login with expired password. 209 Wait Until Page Contains The password is expired and must be changed. timeout=10 245 Verify Error While Creating User With Expired Admin Password 252 Verify User Password Expired Using Redfish ${admin_user} ${default_adminuser_passwd} 254 # Create new user with expired admin password and expect an error. 286 Verify User Password Expired Using Redfish ${admin_user} ${default_adminuser_passwd} 312 # Try to login with expired password and check account is locked.
|
| /openbmc/phosphor-certificate-manager/ |
| H A D | meson.options | 36 'allow-expired', 39 description: 'Allow expired certificates',
|
| H A D | config.h.in | 25 /* Whether to allow expired certificates. */
|
| H A D | x509_utils.cpp | 188 // If ALLOW_EXPIRED is defined, allow expired certificate so that it in validateCertificateAgainstStore() 199 lg2::error("Expired certificate "); in validateCertificateAgainstStore() 200 elog<InvalidCertificate>(Reason("Expired Certificate")); in validateCertificateAgainstStore()
|
| /openbmc/sdbusplus/test/timer/ |
| H A D | timer_not_expire.cpp | 9 /** @brief Makes sure that timer is not expired 22 // Wait 2 seconds and see that timer is not expired in TEST_F()
|
| H A D | timer_callback_not_done.cpp | 9 /** @brief Makes sure that timer is not expired 22 // Wait 2 seconds and see that timer is not expired in TEST_F()
|
| H A D | timer_expire.cpp | 9 /** @brief Makes sure that timer is expired and the
|
| H A D | timer_update_expire.cpp | 26 // Wait 3 seconds and see that timer is expired in TEST_F()
|
| H A D | timer_update_not_expire.cpp | 30 // Wait 2 seconds and see that timer is expired in TEST_F()
|
| /openbmc/openbmc-test-automation/redfish/managers/ |
| H A D | test_certificate.robot | 184 Verify Expired Certificate Install 185 [Documentation] Verify installation of expired certificate. 192 Client Expired Certificate ok 193 CA Expired Certificate ok 196 Verify Expired Certificate Replace 197 [Documentation] Verify replacing the certificate with an expired one. 204 Server Expired Certificate ok
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/keyutils/files/ |
| H A D | keyutils-fix-error-report-by-adding-default-message.patch | 7 EXPIRED and REVOKED are 2 status of kernel security keys features. 20 my_err="Key has expired"
|
| /openbmc/qemu/include/qemu/ |
| H A D | timer.h | 156 * has an expired timer. 159 * an expired timer 245 * return @early at the first expired timer. 299 * are expired. 302 * have expired. 323 * Call all expired timers associated with the timer list. 325 * Returns: true if any timer expired 698 * active list of timers, whether or not it has not yet expired). 709 * Determines whether a timer has expired. 711 * Returns: true if the timer has expired
|
| /openbmc/telemetry/src/ |
| H A D | sensor_cache.cpp | 7 return item.second.expired(); in findExpiredSensor()
|
| /openbmc/telemetry/src/utils/ |
| H A D | unique_call.hpp | 18 if (lock.expired()) in operator ()()
|
| /openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/User/ |
| H A D | Manager.interface.yaml | 67 -user password expired state 86 UserPasswordExpired -> user password expired(boolean)
|
| /openbmc/openbmc/poky/meta/recipes-extended/pam/libpam/pam.d/ |
| H A D | common-account | 7 # only deny service to users whose accounts are expired in /etc/shadow.
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/ |
| H A D | lxdm_0.5.3.bb | 14 file://0003-check-whether-password-expired-with-pam.patch \ 18 file://0007-greeter.c-support-to-update-expired-password.patch \
|