/openbmc/linux/fs/autofs/ |
H A D | expire.c | 394 struct dentry *expired; in should_expire() local 404 expired = autofs_check_leaves(mnt, dentry, timeout, how); in should_expire() 405 if (expired) { in should_expire() 406 if (expired == dentry) in should_expire() 408 return expired; in should_expire() 428 struct dentry *expired; in autofs_expire_indirect() local 447 expired = should_expire(dentry, mnt, timeout, how); in autofs_expire_indirect() 448 if (!expired) in autofs_expire_indirect() 452 ino = autofs_dentry_ino(expired); in autofs_expire_indirect() 461 found = should_expire(expired, mnt, timeout, how); in autofs_expire_indirect() [all …]
|
/openbmc/sdbusplus/include/sdbusplus/ |
H A D | timer.hpp | 32 event(nullptr), eventSource(nullptr), expired(false), in Timer() 48 event(event), eventSource(nullptr), expired(false), in Timer() 76 return expired; in isExpired() 96 expired = false; in start() 145 bool expired; member in sdbusplus::Timer 223 expired = true; in timeoutHandler()
|
/openbmc/docs/designs/ |
H A D | expired-password.md | 1 # Initial expired passwords 30 password) may be expired. 32 account is valid except the account's password is expired (such as indicated 47 Note the terminology: An "expired password" is a special case of "password 54 credentials, whether or not those credentials have expired and must be 67 - The BMC's initial password must be expired when the new EXPIRED_PASSWORD image 69 - An account with an expired password must not be allowed to use the BMC (except 71 - There must be a way to change the expired password using a supported 92 enabled, the BMC's default password will initially be expired as if via the 94 and is not based on time. An account with an expired password is neither [all …]
|
/openbmc/openbmc/poky/meta/recipes-support/ca-certificates/ca-certificates/ |
H A D | 0001-Revert-mozilla-certdata2pem.py-print-a-warning-for-e.patch | 4 Subject: [PATCH] Revert "mozilla/certdata2pem.py: print a warning for expired 8 for expired certs (which is upstream concern, but not ours). 25 * Blacklist expired root certificate "DST Root CA X3" (closes: #995432) 26 - * mozilla/certdata2pem.py: print a warning for expired certificates. 72 - print('Trusted but expired certificate found: %s' % obj['CKA_LABEL'])
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-devices-platform-ACPI-TAD | 45 (RW) The AC alarm expired timer wake policy (see ACPI 6.2, 48 Reads return the current expired timer wake delay for the AC 52 Write a new expired timer wake delay for the AC alarm timer in 53 seconds or "never" to it to set the expired timer wake delay for 54 the AC alarm timer or to set its expired wake policy to discard 68 Bit(0): The timer has expired if set. 80 If the status return value indicates that the timer has expired, 100 (RW,optional) The DC alarm expired timer wake policy.
|
/openbmc/linux/drivers/isdn/mISDN/ |
H A D | timerdev.c | 30 struct list_head expired; member 55 INIT_LIST_HEAD(&dev->expired); in mISDN_open() 85 list_for_each_entry_safe(timer, next, &dev->expired, list) { in mISDN_close() 96 struct list_head *list = &dev->expired; in mISDN_read() 146 if (dev->work || !list_empty(&dev->expired)) in mISDN_poll() 150 dev->work, list_empty(&dev->expired)); in mISDN_poll() 163 list_move_tail(&timer->list, &timer->dev->expired); in dev_expire_timer()
|
/openbmc/linux/drivers/net/ethernet/aquantia/atlantic/macsec/ |
H A D | macsec_api.h | 313 int aq_mss_get_egress_sa_expired(struct aq_hw_s *hw, u32 *expired); 316 u32 *expired); 318 int aq_mss_set_egress_sa_expired(struct aq_hw_s *hw, u32 expired); 321 u32 expired);
|
H A D | macsec_api.c | 2369 static int get_egress_sa_expired(struct aq_hw_s *hw, u32 *expired) in get_egress_sa_expired() argument 2380 *expired = val; in get_egress_sa_expired() 2388 *expired |= val << 16; in get_egress_sa_expired() 2393 int aq_mss_get_egress_sa_expired(struct aq_hw_s *hw, u32 *expired) in aq_mss_get_egress_sa_expired() argument 2395 *expired = 0; in aq_mss_get_egress_sa_expired() 2397 return AQ_API_CALL_SAFE(get_egress_sa_expired, hw, expired); in aq_mss_get_egress_sa_expired() 2401 u32 *expired) in get_egress_sa_threshold_expired() argument 2411 *expired = val; in get_egress_sa_threshold_expired() 2418 *expired |= val << 16; in get_egress_sa_threshold_expired() 2424 u32 *expired) in aq_mss_get_egress_sa_threshold_expired() argument [all …]
|
/openbmc/linux/fs/ |
H A D | timerfd.c | 41 short unsigned expired; member 68 ctx->expired = 1; in timerfd_triggered() 200 ctx->expired = 0; in timerfd_setup() 287 ctx->expired = 0; in timerfd_read() 294 if (ctx->expired && ctx->tintv) { in timerfd_read() 311 ctx->expired = 0; in timerfd_read() 506 if (ctx->expired && ctx->tintv) { in do_timerfd_settime() 536 if (ctx->expired && ctx->tintv) { in do_timerfd_gettime() 537 ctx->expired = 0; in do_timerfd_gettime()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/ |
H A D | 0003-check-whether-password-expired-with-pam.patch | 4 Subject: [PATCH 3/8] check whether password expired with pam 7 password is expired, return it. Only work with pam. 38 + g_debug("user %s account has expired\n", user);
|
H A D | 0007-greeter.c-support-to-update-expired-password.patch | 4 Subject: [PATCH 7/8] greeter.c: support to update expired password 6 Update greeter to work with ui to handle expired password. It checks 7 whether password is expired after input user and password. If expired,
|
/openbmc/sdeventplus/src/sdeventplus/utility/ |
H A D | timer.cpp | 68 return userdata->expired; in hasExpired() 133 userdata->expired = false; in clearExpired() 162 userdata->expired = true; in internalCallback() 192 Timer<Id>(base, sdeventplus::internal::NoOwn()), expired(false), in TimerData()
|
/openbmc/phosphor-certificate-manager/ |
H A D | meson.options | 30 option('allow-expired', 33 description: 'Allow expired certificates',
|
/openbmc/linux/Documentation/networking/ |
H A D | xfrm_proc.rst | 47 State is expired 101 State is expired 113 State is invalid, perhaps expired
|
/openbmc/linux/drivers/fpga/ |
H A D | xilinx-spi.c | 174 bool expired = false; in xilinx_spi_write_complete() local 183 while (!expired) { in xilinx_spi_write_complete() 184 expired = time_after(jiffies, timeout); in xilinx_spi_write_complete()
|
/openbmc/linux/net/ipv4/ |
H A D | tcp_timer.c | 234 bool expired = false, do_reset; in tcp_write_timeout() local 248 expired = icsk->icsk_retransmits >= max_retransmits; in tcp_write_timeout() 269 if (!expired) in tcp_write_timeout() 270 expired = retransmits_timed_out(sk, retry_until, in tcp_write_timeout() 272 tcp_fastopen_active_detect_blackhole(sk, expired); in tcp_write_timeout() 277 icsk->icsk_rto, (int)expired); in tcp_write_timeout() 279 if (expired) { in tcp_write_timeout()
|
/openbmc/linux/arch/x86/kvm/ |
H A D | i8254.c | 215 kthread_queue_work(pit->worker, &pit->expired); in kvm_pit_ack_irq() 237 kthread_flush_work(&pit->expired); in destroy_pit_timer() 242 struct kvm_pit *pit = container_of(work, struct kvm_pit, expired); in pit_do_work() 276 kthread_queue_work(pt->worker, &pt->expired); in pit_timer_fn() 338 kthread_flush_work(&pit->expired); in create_pit_timer() 688 kthread_init_work(&pit->expired, pit_do_work); in kvm_create_pit()
|
/openbmc/linux/net/rxrpc/ |
H A D | call_event.c | 376 bool resend = false, expired = false; in rxrpc_input_call_event() local 405 expired = true; in rxrpc_input_call_event() 412 expired = true; in rxrpc_input_call_event() 418 expired = true; in rxrpc_input_call_event() 475 if (expired) { in rxrpc_input_call_event()
|
/openbmc/linux/Documentation/filesystems/ |
H A D | automount-support.rst | 43 mountpoint to be expired in the automounting procedure outlined separately. 47 (1) Create at least one list off which the vfsmounts to be expired can be 55 (3) When you want mountpoints to be expired, call mark_mounts_for_expiry()
|
/openbmc/telemetry/src/ |
H A D | sensor.cpp | 72 [](const auto& listener) { return listener.expired(); }), in registerForUpdates() 98 return (listener.expired() || in unregisterFromUpdates()
|
H A D | sensor_cache.cpp | 7 [](const auto& item) { return item.second.expired(); }); in findExpiredSensor()
|
/openbmc/bmcweb/redfish-core/include/registries/ |
H A D | license_message_registry.hpp | 137 expired = 1, enumerator
|
/openbmc/telemetry/src/utils/ |
H A D | unique_call.hpp | 18 if (lock.expired()) in operator ()()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/cpprest/cpprest/ |
H A D | disable-outside-tests.patch | 85 - TEST(cert_expired) { handshake_error_test_impl(U("wss://expired.badssl.com/")); } 86 + //TEST(cert_expired) { handshake_error_test_impl(U("wss://expired.badssl.com/")); }
|
/openbmc/linux/drivers/net/wireless/microchip/wilc1000/ |
H A D | hif.h | 124 void (*expired)(void *priv, u64 cookie); member 197 void (*expired)(void *, u64),
|