/openbmc/bios-bmc-smm-error-logger/ |
H A D | meson.options | 50 description: 'Magic Number array[0] for validity, consists of 4 * uint32_t', 56 description: 'Magic Number array[1] for validity, consists of 4 * uint32_t', 62 description: 'Magic Number array[2] for validity, consists of 4 * uint32_t', 68 description: 'Magic Number array[3] for validity, consists of 4 * uint32_t',
|
/openbmc/docs/designs/ |
H A D | redfish-tls-user-authentication.md | 21 SSL certificates provides validity periods, ability to revoke access from CA 211 - certificate has to be in it's validity period 238 to be in its validity period in the moment of session initialization. 273 2. Validity period tests - to confirm that certificates that are not-yet-valid 274 and expired ones are not accepted, by both - changing validity periods in 281 validity period, invalid CA, binary broken certificate, etc.
|
/openbmc/libpldm/include/libpldm/ |
H A D | bios_table.h | 94 /** @brief Create an entry of BIOS String Table and check the validity of the 123 /** @brief Get the string from the entry and check the validity of the 224 * validity of the parameters 239 * validity of the parameters 249 * validity of the parameters 258 /** @brief Get possible values string handles and check the validity of the 321 * validity of the parameters 336 * validity of the parameters 410 * validity of the parameters 473 /** @brief Create an attribute value entry(type: enum) and check the validity of [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/ |
H A D | Certificate.interface.yaml | 17 An X.509 certificate contains a public key, validity, and an identity 93 The certificate validity start date and time, in epoch time, in
|
/openbmc/u-boot/board/toradex/common/ |
H A D | tdx-common.c | 22 /* Check validity */ in get_board_rev() 42 /* Check validity */ in get_board_serial()
|
/openbmc/openbmc/meta-security/meta-integrity/data/debug-keys/ |
H A D | README.md | 10 The CA's (self-signed) certificate can be used to verify the validity of
|
/openbmc/openbmc/meta-facebook/meta-harma/recipes-phosphor/gpio/phosphor-gpio-monitor/ |
H A D | assert-power-good | 6 # Check SGPIO validity
|
H A D | deassert-power-good | 6 # Check SGPIO validity
|
/openbmc/docs/security/ |
H A D | TLS-configuration.md | 28 - certificate has to be in its validity period 214 - Validity in both certificates, 234 Validity 269 Validity 304 Validity
|
/openbmc/u-boot/arch/arm/mach-aspeed/ast2500/ |
H A D | utils.S | 26 * NOTE that the caller must ensure the validity of parameters.
|
/openbmc/u-boot/arch/arm/mach-aspeed/ast2400/ |
H A D | utils.S | 26 * NOTE that the caller must ensure the validity of parameters.
|
/openbmc/openbmc/meta-security/dynamic-layers/meta-perl/recipes-security/bastille/files/ |
H A D | allow_os_with_assess.patch | 31 # There is no validity/combination checking done with these.
|
/openbmc/openbmc/poky/bitbake/ |
H A D | ChangeLog | 104 saving the cache when its changed, moving the cache validity check into 118 how extensively stamps are looked at for validity 128 - Add ability to fetchers to check URL validity without downloading 151 recheck the validity of the config files time after time
|
/openbmc/u-boot/arch/arm/mach-aspeed/ast2600/ |
H A D | utils.S | 51 * NOTE that the caller must ensure the validity of parameters.
|
/openbmc/gpioplus/src/gpioplus/utility/ |
H A D | aspeed.hpp | 18 * cases. If you want compile time guarantees of validity, make sure
|
/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | xpp | 21 …NCE OF SOFTWARE AND/OR ASSOCIATED MATERIALS, AND TO THE PERFORMANCE AND VALIDITY OF INFORMATION GE…
|
H A D | MTLL | 24 …NCE OF SOFTWARE AND/OR ASSOCIATED MATERIALS, AND TO THE PERFORMANCE AND VALIDITY OF INFORMATION GE…
|
H A D | eGenix | 29 …ssible, be severed from this License Agreement and shall not affect the validity and enforceabilit…
|
/openbmc/libcper/tests/ |
H A D | ir-tests.c | 206 //Tests fixed CPER sections for IR validity with an example set. 281 //Tests a single randomly generated CPER section of the given type to ensure CPER-JSON IR validity. 314 //Tests a single randomly generated CPER section of the given type to ensure CPER-JSON IR validity. 431 //Tests randomly generated CPER sections for IR validity of a given type, in both single section mo…
|
/openbmc/openpower-vpd-parser/vpd-manager/include/ |
H A D | keyword_vpd_parser.hpp | 78 * @brief Check for given number of bytes validity
|
H A D | ipz_parser.hpp | 62 * Note: Caller needs to check validity of the map returned. Throws 70 * @brief API to check validity of VPD header.
|
H A D | ddimm_parser.hpp | 106 * @brief This function checks the validity of the bits
|
H A D | manager.hpp | 242 * @brief An api to check validity of unexpanded location code. 246 * @return True/False based on validity check.
|
/openbmc/qemu/hw/ppc/ |
H A D | spapr_pci_vfio.c | 178 * call. Now we just need to check the validity of the PCI in spapr_phb_vfio_eeh_set_option() 187 * Hence if we check validity of supplied config_addr whether in spapr_phb_vfio_eeh_set_option()
|
/openbmc/u-boot/include/linux/ |
H A D | build_bug.h | 33 * BUILD_BUG_ON_INVALID() permits the compiler to check the validity of the
|