/openbmc/linux/arch/s390/include/asm/ |
H A D | nmi.h | 60 u64 wp : 1; /* 20 psw mwp validity */ 61 u64 ms : 1; /* 21 psw mask and key validity */ 62 u64 pm : 1; /* 22 psw program mask and cc validity */ 63 u64 ia : 1; /* 23 psw instruction address validity */ 64 u64 fa : 1; /* 24 failing storage address validity */ 65 u64 vr : 1; /* 25 vector register validity */ 66 u64 ec : 1; /* 26 external damage code validity */ 67 u64 fp : 1; /* 27 floating point register validity */ 68 u64 gr : 1; /* 28 general register validity */ 69 u64 cr : 1; /* 29 control register validity */ [all …]
|
H A D | scsw.h | 386 * scsw_cmd_is_valid_key - check key field validity 398 * scsw_cmd_is_valid_sctl - check sctl field validity 410 * scsw_cmd_is_valid_eswf - check eswf field validity 422 * scsw_cmd_is_valid_cc - check cc field validity 435 * scsw_cmd_is_valid_fmt - check fmt field validity 447 * scsw_cmd_is_valid_pfch - check pfch field validity 459 * scsw_cmd_is_valid_isic - check isic field validity 471 * scsw_cmd_is_valid_alcc - check alcc field validity 483 * scsw_cmd_is_valid_ssi - check ssi field validity 495 * scsw_cmd_is_valid_zcc - check zcc field validity [all …]
|
H A D | cio.h | 85 * @fsavf: failing storage address validity flag 87 * @scavf: secondary ccw address validity flag 123 * @fvf: field-validity flags 279 u32 validity:3; member
|
/openbmc/bios-bmc-smm-error-logger/ |
H A D | meson.options | 50 description: 'Magic Number array[0] for validity, consists of 4 * uint32_t', 56 description: 'Magic Number array[1] for validity, consists of 4 * uint32_t', 62 description: 'Magic Number array[2] for validity, consists of 4 * uint32_t', 68 description: 'Magic Number array[3] for validity, consists of 4 * uint32_t',
|
/openbmc/linux/crypto/asymmetric_keys/ |
H A D | x509.asn1 | 12 validity Validity, 37 Validity ::= SEQUENCE {
|
/openbmc/linux/arch/arm/include/debug/ |
H A D | tegra.S | 106 /* Check UART A validity */ 112 /* Check UART B validity */ 118 /* Check UART C validity */ 124 /* Check UART D validity */ 130 /* Check UART E validity */
|
/openbmc/docs/designs/ |
H A D | redfish-tls-user-authentication.md | 21 SSL certificates provides validity periods, ability to revoke access from CA 211 - certificate has to be in it's validity period 238 to be in its validity period in the moment of session initialization. 273 2. Validity period tests - to confirm that certificates that are not-yet-valid 274 and expired ones are not accepted, by both - changing validity periods in 281 validity period, invalid CA, binary broken certificate, etc.
|
/openbmc/libpldm/include/libpldm/ |
H A D | bios_table.h | 94 /** @brief Create an entry of BIOS String Table and check the validity of the 123 /** @brief Get the string from the entry and check the validity of the 224 * validity of the parameters 239 * validity of the parameters 249 * validity of the parameters 258 /** @brief Get possible values string handles and check the validity of the 321 * validity of the parameters 336 * validity of the parameters 410 * validity of the parameters 473 /** @brief Create an attribute value entry(type: enum) and check the validity of [all …]
|
/openbmc/linux/scripts/dtc/libfdt/ |
H A D | fdt_addresses.c | 73 /* check validity of address */ in fdt_appendprop_addrrange() 86 /* check validity of size */ in fdt_appendprop_addrrange()
|
/openbmc/linux/tools/testing/selftests/arm64/mte/ |
H A D | check_tags_inclusion.c | 25 /* Check the validity of the tagged pointer */ in verify_mte_pointer_validity() 37 /* Check the validity outside the range */ in verify_mte_pointer_validity() 161 /* Check the write validity of the untagged pointer */ in check_none_included_tags()
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/ |
H A D | Certificate.interface.yaml | 17 An X.509 certificate contains a public key, validity, and an identity 93 The certificate validity start date and time, in epoch time, in
|
/openbmc/u-boot/board/toradex/common/ |
H A D | tdx-common.c | 22 /* Check validity */ in get_board_rev() 42 /* Check validity */ in get_board_serial()
|
/openbmc/docs/security/ |
H A D | TLS-configuration.md | 28 - certificate has to be in its validity period 214 - Validity in both certificates, 234 Validity 269 Validity 304 Validity
|
/openbmc/linux/drivers/usb/class/ |
H A D | cdc-wdm.c | 84 struct urb *validity; member 342 usb_poison_urb(desc->validity); in poison_urbs() 353 usb_unpoison_urb(desc->validity); in unpoison_urbs() 359 usb_free_urb(desc->validity); in free_urbs() 741 rv = usb_submit_urb(desc->validity, GFP_KERNEL); in wdm_open() 851 return usb_submit_urb(desc->validity, GFP_KERNEL); in wdm_wwan_port_start() 1054 desc->validity = usb_alloc_urb(0, GFP_KERNEL); in wdm_create() 1055 if (!desc->validity) in wdm_create() 1079 desc->validity, in wdm_create() 1290 rv = usb_submit_urb(desc->validity, GFP_NOIO); in recover_from_urb_loss()
|
/openbmc/linux/drivers/net/can/dev/ |
H A D | bittiming.c | 44 /* Checks the validity of the specified bit-timing parameters prop_seg, 113 /* Checks the validity of predefined bitrate settings */
|
/openbmc/linux/Documentation/firmware-guide/acpi/ |
H A D | DSD-properties-rules.rst | 49 General Validity Rule for Property Sets 88 In those cases, however, the above validity considerations must be taken into
|
/openbmc/openbmc/poky/bitbake/ |
H A D | ChangeLog | 104 saving the cache when its changed, moving the cache validity check into 118 how extensively stamps are looked at for validity 128 - Add ability to fetchers to check URL validity without downloading 151 recheck the validity of the config files time after time
|
/openbmc/linux/Documentation/virt/kvm/s390/ |
H A D | s390-pv.rst | 41 at the time of injection, a validity interception is recognized. The 93 discussed before. Other data is either ignored or results in validity
|
/openbmc/openbmc/meta-security/meta-integrity/data/debug-keys/ |
H A D | README.md | 10 The CA's (self-signed) certificate can be used to verify the validity of
|
/openbmc/libcper/tests/ |
H A D | ir-tests.cpp | 87 //Tests fixed CPER sections for IR validity with an example set. 140 //Tests a single randomly generated CPER section of the given type to ensure CPER-JSON IR validity. 226 //Tests randomly generated CPER sections for IR validity of a given type, in both single section mo…
|
/openbmc/linux/arch/powerpc/kernel/ |
H A D | rtas_pci.c | 89 /* Validity of pdn is checked in here */ in rtas_pci_read_config() 136 /* Validity of pdn is checked in here. */ in rtas_pci_write_config()
|
/openbmc/linux/drivers/net/ethernet/intel/e1000e/ |
H A D | manage.h | 40 #define E1000_HICR_SV 0x04 /* Status Validity */
|
/openbmc/linux/arch/mips/include/asm/sn/ |
H A D | kldir.h | 20 u64 magic; /* Indicates validity of entry */
|
/openbmc/u-boot/arch/arm/mach-aspeed/ast2500/ |
H A D | utils.S | 26 * NOTE that the caller must ensure the validity of parameters.
|
/openbmc/linux/drivers/scsi/qedf/ |
H A D | drv_scsi_fw_funcs.c | 18 /* no need to check for sgl_task_params->sgl validity */ in init_scsi_sgl_context()
|