/openbmc/sdbusplus/include/sdbusplus/ |
H A D | timer.hpp | 32 event(nullptr), eventSource(nullptr), expired(false), in Timer() 48 event(event), eventSource(nullptr), expired(false), in Timer() 76 return expired; in isExpired() 96 expired = false; in start() 145 bool expired; member in sdbusplus::Timer 223 expired = true; in timeoutHandler()
|
/openbmc/linux/fs/autofs/ |
H A D | expire.c | 394 struct dentry *expired; in should_expire() local 405 if (expired) { in should_expire() 406 if (expired == dentry) in should_expire() 408 return expired; in should_expire() 428 struct dentry *expired; in autofs_expire_indirect() local 448 if (!expired) in autofs_expire_indirect() 467 if (expired != dentry) in autofs_expire_indirect() 476 if (expired != dentry) in autofs_expire_indirect() 477 dput(expired); in autofs_expire_indirect() 482 pr_debug("returning %p %pd\n", expired, expired); in autofs_expire_indirect() [all …]
|
/openbmc/docs/designs/ |
H A D | expired-password.md | 1 # Initial expired passwords 30 password) may be expired. 47 Note the terminology: An "expired password" is a special case of "password 54 credentials, whether or not those credentials have expired and must be 71 - There must be a way to change the expired password using a supported 102 access via an account which has an expired password. If the access 126 for the expired password dialog. 153 the BMC's initial expired password and password expired for another cause such 161 expired password: 229 needed to detect and change an expired password. [all …]
|
/openbmc/openbmc/poky/meta/recipes-support/ca-certificates/ca-certificates/ |
H A D | 0001-Revert-mozilla-certdata2pem.py-print-a-warning-for-e.patch | 4 Subject: [PATCH] Revert "mozilla/certdata2pem.py: print a warning for expired 8 for expired certs (which is upstream concern, but not ours). 25 * Blacklist expired root certificate "DST Root CA X3" (closes: #995432) 26 - * mozilla/certdata2pem.py: print a warning for expired certificates. 72 - print('Trusted but expired certificate found: %s' % obj['CKA_LABEL'])
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-devices-platform-ACPI-TAD | 45 (RW) The AC alarm expired timer wake policy (see ACPI 6.2, 48 Reads return the current expired timer wake delay for the AC 52 Write a new expired timer wake delay for the AC alarm timer in 53 seconds or "never" to it to set the expired timer wake delay for 54 the AC alarm timer or to set its expired wake policy to discard 68 Bit(0): The timer has expired if set. 80 If the status return value indicates that the timer has expired, 100 (RW,optional) The DC alarm expired timer wake policy.
|
/openbmc/linux/drivers/isdn/mISDN/ |
H A D | timerdev.c | 30 struct list_head expired; member 55 INIT_LIST_HEAD(&dev->expired); in mISDN_open() 85 list_for_each_entry_safe(timer, next, &dev->expired, list) { in mISDN_close() 96 struct list_head *list = &dev->expired; in mISDN_read() 146 if (dev->work || !list_empty(&dev->expired)) in mISDN_poll() 150 dev->work, list_empty(&dev->expired)); in mISDN_poll() 163 list_move_tail(&timer->list, &timer->dev->expired); in dev_expire_timer()
|
/openbmc/linux/drivers/net/ethernet/aquantia/atlantic/macsec/ |
H A D | macsec_api.h | 313 int aq_mss_get_egress_sa_expired(struct aq_hw_s *hw, u32 *expired); 316 u32 *expired); 318 int aq_mss_set_egress_sa_expired(struct aq_hw_s *hw, u32 expired); 321 u32 expired);
|
H A D | macsec_api.c | 2380 *expired = val; in get_egress_sa_expired() 2388 *expired |= val << 16; in get_egress_sa_expired() 2395 *expired = 0; in aq_mss_get_egress_sa_expired() 2401 u32 *expired) in get_egress_sa_threshold_expired() argument 2411 *expired = val; in get_egress_sa_threshold_expired() 2424 u32 *expired) in aq_mss_get_egress_sa_threshold_expired() argument 2426 *expired = 0; in aq_mss_get_egress_sa_threshold_expired() 2437 expired & 0xFFFF); in set_egress_sa_expired() 2443 expired >> 16); in set_egress_sa_expired() 2461 expired & 0xFFFF); in set_egress_sa_threshold_expired() [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/ |
H A D | 0003-check-whether-password-expired-with-pam.patch | 4 Subject: [PATCH 3/8] check whether password expired with pam 7 password is expired, return it. Only work with pam. 38 + g_debug("user %s account has expired\n", user);
|
H A D | 0007-greeter.c-support-to-update-expired-password.patch | 4 Subject: [PATCH 7/8] greeter.c: support to update expired password 6 Update greeter to work with ui to handle expired password. It checks 7 whether password is expired after input user and password. If expired,
|
/openbmc/linux/fs/ |
H A D | timerfd.c | 41 short unsigned expired; member 68 ctx->expired = 1; in timerfd_triggered() 200 ctx->expired = 0; in timerfd_setup() 287 ctx->expired = 0; in timerfd_read() 294 if (ctx->expired && ctx->tintv) { in timerfd_read() 311 ctx->expired = 0; in timerfd_read() 506 if (ctx->expired && ctx->tintv) { in do_timerfd_settime() 536 if (ctx->expired && ctx->tintv) { in do_timerfd_gettime() 537 ctx->expired = 0; in do_timerfd_gettime()
|
/openbmc/sdeventplus/src/sdeventplus/utility/ |
H A D | timer.cpp | 68 return userdata->expired; in hasExpired() 133 userdata->expired = false; in clearExpired() 162 userdata->expired = true; in internalCallback() 193 expired(false), initialized(interval.has_value()), in TimerData()
|
/openbmc/phosphor-certificate-manager/ |
H A D | meson.options | 30 option('allow-expired', 33 description: 'Allow expired certificates',
|
/openbmc/linux/Documentation/networking/ |
H A D | xfrm_proc.rst | 47 State is expired 101 State is expired 113 State is invalid, perhaps expired
|
/openbmc/linux/drivers/fpga/ |
H A D | xilinx-spi.c | 174 bool expired = false; in xilinx_spi_write_complete() local 183 while (!expired) { in xilinx_spi_write_complete() 184 expired = time_after(jiffies, timeout); in xilinx_spi_write_complete()
|
/openbmc/linux/net/ipv4/ |
H A D | tcp_timer.c | 238 bool expired = false, do_reset; in tcp_write_timeout() local 252 expired = icsk->icsk_retransmits >= max_retransmits; in tcp_write_timeout() 273 if (!expired) in tcp_write_timeout() 274 expired = retransmits_timed_out(sk, retry_until, in tcp_write_timeout() 276 tcp_fastopen_active_detect_blackhole(sk, expired); in tcp_write_timeout() 281 icsk->icsk_rto, (int)expired); in tcp_write_timeout() 283 if (expired) { in tcp_write_timeout()
|
/openbmc/linux/arch/x86/kvm/ |
H A D | i8254.c | 215 kthread_queue_work(pit->worker, &pit->expired); in kvm_pit_ack_irq() 237 kthread_flush_work(&pit->expired); in destroy_pit_timer() 242 struct kvm_pit *pit = container_of(work, struct kvm_pit, expired); in pit_do_work() 276 kthread_queue_work(pt->worker, &pt->expired); in pit_timer_fn() 338 kthread_flush_work(&pit->expired); in create_pit_timer() 688 kthread_init_work(&pit->expired, pit_do_work); in kvm_create_pit()
|
H A D | i8254.h | 48 struct kthread_work expired; member
|
/openbmc/linux/net/rxrpc/ |
H A D | call_event.c | 376 bool resend = false, expired = false; in rxrpc_input_call_event() local 405 expired = true; in rxrpc_input_call_event() 412 expired = true; in rxrpc_input_call_event() 418 expired = true; in rxrpc_input_call_event() 475 if (expired) { in rxrpc_input_call_event()
|
/openbmc/bmcweb/redfish-core/include/registries/ |
H A D | license_message_registry.hpp | 134 expired = 1, enumerator
|
/openbmc/telemetry/src/utils/ |
H A D | unique_call.hpp | 18 if (lock.expired()) in operator ()()
|
/openbmc/telemetry/src/ |
H A D | sensor_cache.cpp | 7 [](const auto& item) { return item.second.expired(); }); in findExpiredSensor()
|
H A D | sensor.cpp | 72 [](const auto& listener) { return listener.expired(); }), in registerForUpdates() 98 return (listener.expired() || in unregisterFromUpdates()
|
/openbmc/linux/Documentation/filesystems/ |
H A D | automount-support.rst | 43 mountpoint to be expired in the automounting procedure outlined separately. 47 (1) Create at least one list off which the vfsmounts to be expired can be 55 (3) When you want mountpoints to be expired, call mark_mounts_for_expiry()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/cpprest/cpprest/ |
H A D | disable-outside-tests.patch | 85 - TEST(cert_expired) { handshake_error_test_impl(U("wss://expired.badssl.com/")); } 86 + //TEST(cert_expired) { handshake_error_test_impl(U("wss://expired.badssl.com/")); }
|