Home
last modified time | relevance | path

Searched refs:expired (Results 1 – 25 of 122) sorted by relevance

12345

/openbmc/sdbusplus/include/sdbusplus/
H A Dtimer.hpp32 event(nullptr), eventSource(nullptr), expired(false), in Timer()
48 event(event), eventSource(nullptr), expired(false), in Timer()
76 return expired; in isExpired()
96 expired = false; in start()
145 bool expired; member in sdbusplus::Timer
223 expired = true; in timeoutHandler()
/openbmc/linux/fs/autofs/
H A Dexpire.c394 struct dentry *expired; in should_expire() local
405 if (expired) { in should_expire()
406 if (expired == dentry) in should_expire()
408 return expired; in should_expire()
428 struct dentry *expired; in autofs_expire_indirect() local
448 if (!expired) in autofs_expire_indirect()
467 if (expired != dentry) in autofs_expire_indirect()
476 if (expired != dentry) in autofs_expire_indirect()
477 dput(expired); in autofs_expire_indirect()
482 pr_debug("returning %p %pd\n", expired, expired); in autofs_expire_indirect()
[all …]
/openbmc/docs/designs/
H A Dexpired-password.md1 # Initial expired passwords
30 password) may be expired.
47 Note the terminology: An "expired password" is a special case of "password
54 credentials, whether or not those credentials have expired and must be
71 - There must be a way to change the expired password using a supported
102 access via an account which has an expired password. If the access
126 for the expired password dialog.
153 the BMC's initial expired password and password expired for another cause such
161 expired password:
229 needed to detect and change an expired password.
[all …]
/openbmc/openbmc/poky/meta/recipes-support/ca-certificates/ca-certificates/
H A D0001-Revert-mozilla-certdata2pem.py-print-a-warning-for-e.patch4 Subject: [PATCH] Revert "mozilla/certdata2pem.py: print a warning for expired
8 for expired certs (which is upstream concern, but not ours).
25 * Blacklist expired root certificate "DST Root CA X3" (closes: #995432)
26 - * mozilla/certdata2pem.py: print a warning for expired certificates.
72 - print('Trusted but expired certificate found: %s' % obj['CKA_LABEL'])
/openbmc/linux/Documentation/ABI/testing/
H A Dsysfs-devices-platform-ACPI-TAD45 (RW) The AC alarm expired timer wake policy (see ACPI 6.2,
48 Reads return the current expired timer wake delay for the AC
52 Write a new expired timer wake delay for the AC alarm timer in
53 seconds or "never" to it to set the expired timer wake delay for
54 the AC alarm timer or to set its expired wake policy to discard
68 Bit(0): The timer has expired if set.
80 If the status return value indicates that the timer has expired,
100 (RW,optional) The DC alarm expired timer wake policy.
/openbmc/linux/drivers/isdn/mISDN/
H A Dtimerdev.c30 struct list_head expired; member
55 INIT_LIST_HEAD(&dev->expired); in mISDN_open()
85 list_for_each_entry_safe(timer, next, &dev->expired, list) { in mISDN_close()
96 struct list_head *list = &dev->expired; in mISDN_read()
146 if (dev->work || !list_empty(&dev->expired)) in mISDN_poll()
150 dev->work, list_empty(&dev->expired)); in mISDN_poll()
163 list_move_tail(&timer->list, &timer->dev->expired); in dev_expire_timer()
/openbmc/linux/drivers/net/ethernet/aquantia/atlantic/macsec/
H A Dmacsec_api.h313 int aq_mss_get_egress_sa_expired(struct aq_hw_s *hw, u32 *expired);
316 u32 *expired);
318 int aq_mss_set_egress_sa_expired(struct aq_hw_s *hw, u32 expired);
321 u32 expired);
H A Dmacsec_api.c2380 *expired = val; in get_egress_sa_expired()
2388 *expired |= val << 16; in get_egress_sa_expired()
2395 *expired = 0; in aq_mss_get_egress_sa_expired()
2401 u32 *expired) in get_egress_sa_threshold_expired() argument
2411 *expired = val; in get_egress_sa_threshold_expired()
2424 u32 *expired) in aq_mss_get_egress_sa_threshold_expired() argument
2426 *expired = 0; in aq_mss_get_egress_sa_threshold_expired()
2437 expired & 0xFFFF); in set_egress_sa_expired()
2443 expired >> 16); in set_egress_sa_expired()
2461 expired & 0xFFFF); in set_egress_sa_threshold_expired()
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/
H A D0003-check-whether-password-expired-with-pam.patch4 Subject: [PATCH 3/8] check whether password expired with pam
7 password is expired, return it. Only work with pam.
38 + g_debug("user %s account has expired\n", user);
H A D0007-greeter.c-support-to-update-expired-password.patch4 Subject: [PATCH 7/8] greeter.c: support to update expired password
6 Update greeter to work with ui to handle expired password. It checks
7 whether password is expired after input user and password. If expired,
/openbmc/linux/fs/
H A Dtimerfd.c41 short unsigned expired; member
68 ctx->expired = 1; in timerfd_triggered()
200 ctx->expired = 0; in timerfd_setup()
287 ctx->expired = 0; in timerfd_read()
294 if (ctx->expired && ctx->tintv) { in timerfd_read()
311 ctx->expired = 0; in timerfd_read()
506 if (ctx->expired && ctx->tintv) { in do_timerfd_settime()
536 if (ctx->expired && ctx->tintv) { in do_timerfd_gettime()
537 ctx->expired = 0; in do_timerfd_gettime()
/openbmc/sdeventplus/src/sdeventplus/utility/
H A Dtimer.cpp68 return userdata->expired; in hasExpired()
133 userdata->expired = false; in clearExpired()
162 userdata->expired = true; in internalCallback()
193 expired(false), initialized(interval.has_value()), in TimerData()
/openbmc/phosphor-certificate-manager/
H A Dmeson.options30 option('allow-expired',
33 description: 'Allow expired certificates',
/openbmc/linux/Documentation/networking/
H A Dxfrm_proc.rst47 State is expired
101 State is expired
113 State is invalid, perhaps expired
/openbmc/linux/drivers/fpga/
H A Dxilinx-spi.c174 bool expired = false; in xilinx_spi_write_complete() local
183 while (!expired) { in xilinx_spi_write_complete()
184 expired = time_after(jiffies, timeout); in xilinx_spi_write_complete()
/openbmc/linux/net/ipv4/
H A Dtcp_timer.c238 bool expired = false, do_reset; in tcp_write_timeout() local
252 expired = icsk->icsk_retransmits >= max_retransmits; in tcp_write_timeout()
273 if (!expired) in tcp_write_timeout()
274 expired = retransmits_timed_out(sk, retry_until, in tcp_write_timeout()
276 tcp_fastopen_active_detect_blackhole(sk, expired); in tcp_write_timeout()
281 icsk->icsk_rto, (int)expired); in tcp_write_timeout()
283 if (expired) { in tcp_write_timeout()
/openbmc/linux/arch/x86/kvm/
H A Di8254.c215 kthread_queue_work(pit->worker, &pit->expired); in kvm_pit_ack_irq()
237 kthread_flush_work(&pit->expired); in destroy_pit_timer()
242 struct kvm_pit *pit = container_of(work, struct kvm_pit, expired); in pit_do_work()
276 kthread_queue_work(pt->worker, &pt->expired); in pit_timer_fn()
338 kthread_flush_work(&pit->expired); in create_pit_timer()
688 kthread_init_work(&pit->expired, pit_do_work); in kvm_create_pit()
H A Di8254.h48 struct kthread_work expired; member
/openbmc/linux/net/rxrpc/
H A Dcall_event.c376 bool resend = false, expired = false; in rxrpc_input_call_event() local
405 expired = true; in rxrpc_input_call_event()
412 expired = true; in rxrpc_input_call_event()
418 expired = true; in rxrpc_input_call_event()
475 if (expired) { in rxrpc_input_call_event()
/openbmc/bmcweb/redfish-core/include/registries/
H A Dlicense_message_registry.hpp134 expired = 1, enumerator
/openbmc/telemetry/src/utils/
H A Dunique_call.hpp18 if (lock.expired()) in operator ()()
/openbmc/telemetry/src/
H A Dsensor_cache.cpp7 [](const auto& item) { return item.second.expired(); }); in findExpiredSensor()
H A Dsensor.cpp72 [](const auto& listener) { return listener.expired(); }), in registerForUpdates()
98 return (listener.expired() || in unregisterFromUpdates()
/openbmc/linux/Documentation/filesystems/
H A Dautomount-support.rst43 mountpoint to be expired in the automounting procedure outlined separately.
47 (1) Create at least one list off which the vfsmounts to be expired can be
55 (3) When you want mountpoints to be expired, call mark_mounts_for_expiry()
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/cpprest/cpprest/
H A Ddisable-outside-tests.patch85 - TEST(cert_expired) { handshake_error_test_impl(U("wss://expired.badssl.com/")); }
86 + //TEST(cert_expired) { handshake_error_test_impl(U("wss://expired.badssl.com/")); }

12345