Searched refs:expired (Results 1 - 25 of 35) sorted by relevance

12

/macosx-10.10/llvmCore-3425.0.34/bindings/python/llvm/
H A Dobject.py58 # This is NOT OK. You perform a lookup after the object has expired.
61 print symbol.name # This raises because the object has expired.
188 self.expired = False
196 if self.expired:
197 raise Exception('Section instance has expired.')
204 if self.expired:
205 raise Exception('Section instance has expired.')
211 if self.expired:
212 raise Exception('Section instance has expired.')
219 if self.expired
[all...]
/macosx-10.10/ksh-23/ksh/src/cmd/ksh93/bltins/
H A Dsleep.c132 char *expired = (char*)handle; local
133 *expired = 1;
141 char expired = 0; local
143 tp = (void*)sh_timeradd(1000*sec, 0, completed, (void*)&expired);
155 if(expired)
156 expired = 0;
159 tp = (void*)sh_timeradd(1000*sec, 0, completed, (void*)&expired);
162 while(!expired && shp->lastsig==0);
163 if(!expired)
/macosx-10.10/sudo-73/src/
H A Dsiglist.in33 VTALRM Virtual timer expired
34 PROF Profiling timer expired
/macosx-10.10/OpenSSH-189/openssh/openbsd-compat/
H A Dport-aix.c177 int authsuccess = 0, expired, reenter, result; local
200 * Check if the user's password is expired.
202 expired = passwdexpired(name, &msg);
207 debug3("AIX/passwdexpired returned %d msg %.100s", expired, msg);
209 switch (expired) {
210 case 0: /* password not expired */
212 case 1: /* expired, password change required */
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/sslScripts/
H A DAlexTest6 echo === $SSL_HOST : expired leaf cert ===
30 echo === $SSL_HOST : good leaf, expired root ===
/macosx-10.10/ruby-106/ruby/lib/rinda/
H A Dtuplespace.rb25 # nil, or true to indicate when the tuple has expired.
43 # A TupleEntry is dead when it is canceled or expired.
46 !canceled? && !expired?
61 # Has this tuple expired? (true/false).
63 # A tuple has expired when its expiry timer based on the +sec+ argument to
66 def expired?
79 # +false+:: it has expired.
93 # +true+:: the expiry time is the start of 1970 (i.e. expired)
322 # +true+ if the TupleBag to see if it has any expired entries.
454 if entry.expired
[all...]
/macosx-10.10/apache-793/httpd/modules/cache/
H A Dmod_socache_dbm.c315 /* make sure the stuff is still not expired */
362 int expired; local
384 * same time delete expired ones. Some of them get totally crazy
387 * those which have to be expired. Then in a second pass we delete
388 * all those expired elements. Additionally we reopen the DBM file
415 expired = FALSE;
418 expired = TRUE;
422 expired = TRUE;
424 if (expired) {
436 /* pass 2: delete expired element
515 int expired; local
[all...]
H A Dmod_socache_shmcb.c633 ap_rprintf(r, "total entries expired since starting: <b>%lu</b><br>",
677 unsigned int loop = 0, freed = 0, expired = 0; local
686 expired++;
688 /* not removed and not expired yet, we're done iterating */
698 expired, freed);
715 header->stat_expiries += expired;
738 /* First reclaim space from removed and expired records. */
839 * flag isn't set, and the record is not expired.
872 "shmcb_subcache_retrieve discarding expired entry");
995 "shmcb_subcache_iterate discarding expired entr
[all...]
/macosx-10.10/Heimdal-398.1.2/tools/
H A Dkdc-log-analyze.pl421 } elsif (/TCP-connection from IPv[46]:([0-9\.:a-fA-F]+) expired after [0-9]+ bytes/) {
473 } elsif (/krb_rd_req: Ticket expired \(krb_rd_req\)/) {
474 } elsif (/Ticket expired \(.*\)/) {
490 } elsif (/Failed to verify AP-REQ: Ticket expired/) {
/macosx-10.10/ruby-106/ruby/test/rinda/
H A Dtest_rinda.rb121 assert(!tuple.expired?)
416 assert(tuple.expired?)
421 assert(!tuple.expired?)
424 assert(tuple.expired?)
430 assert(!tuple.expired?)
434 assert(!tuple.expired?)
437 assert(tuple.expired?)
/macosx-10.10/OpenSSL098-52/src/test/
H A Dtests.com209 $ write sys$output "There are definitly a few expired certificates"
/macosx-10.10/bind9-45.101/bind9/
H A Dbind.keys19 # initialize correctly, it may have expired. In that event you should
/macosx-10.10/Heimdal-398.1.2/kuser/
H A Dklist.c213 printf(N_(" (expired)", ""));
542 int expired = 0; local
546 expired = check_expiration(context, id, &t);
557 if (expired && !opt->json_flag)
575 expired ? "yes" : "no");
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/dnssec/
H A Dclean.sh35 rm -f ns3/expired.example.db ns3/update-nsec3.example.db
/macosx-10.10/libstdcxx-104.1/include/c++/4.2.1/tr1/
H A Dboost_shared_ptr.h569 * @throw bad_weak_ptr when __r.expired(),
848 if (expired())
865 return expired() ? __shared_ptr<element_type, _Lp>()
876 expired() const // never throws function in class:std::__weak_ptr
1085 if (this->expired())
1097 return this->expired() ? shared_ptr<_Tp>()
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/dnssec/ns3/
H A Dsign.sh265 # A zone with the expired signatures
267 zone=expired.example.
268 infile=expired.example.db.in
269 zonefile=expired.example.db
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/dnssec/ns2/
H A Dsign.sh35 auto-nsec auto-nsec3 secure.below-cname ttlpatch expired
/macosx-10.10/ruby-106/ruby/lib/webrick/httpauth/
H A Ddigestauth.rb338 error("%s: nonce is expired.", username)
/macosx-10.10/Heimdal-398.1.2/lib/sqlite/
H A Dsqlite3ext.h91 int (*expired)(sqlite3_stmt*); member in struct:sqlite3_api_routines
292 #define sqlite3_expired sqlite3_api->expired
/macosx-10.10/xnu-2782.1.97/bsd/kern/
H A Dkern_credential.c1252 /* have to drop lock before freeing expired entry (it may be in use) */
1257 /* free the expired entry */
1478 * Notes: This is called even if the entry has expired; typically an
1479 * expired entry that's been looked up is about to be revalidated,
1502 * 0 Not expired
1531 * 0 Not expired
1559 * 0 Not expired
1667 * Note: The association may be expired, in which case the caller
1740 * Note: The association may be expired, in which case the caller
2483 int (* expired)(struc
[all...]
/macosx-10.10/bind9-45.101/bind9/bin/dnssec/
H A Ddnssec-signzone.c455 isc_boolean_t expired, future; local
468 expired = isc_serial_gt(now + cycle, rrsig.timeexpire);
470 expired = isc_serial_gt(now, rrsig.timeexpire);
485 expired ? "retained" : "dropped", sigstr);
486 if (!expired)
489 if (!expired && rrsig.originalttl == set->ttl &&
497 sigstr, expired ? "expired" :
504 if (!expired && rrsig.originalttl == set->ttl &&
512 sigstr, expired
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_x509_tp/lib/
H A DTPCertInfo.cpp1210 bool expired = false; local
1219 /* check for expired, not valid yet */
1230 expired = true;
1237 if(expired && !allowExpired) {
1423 * Temporal validity check: if we're not already holding an expired
1428 tpDebug("findIssuerForCertOrCrl: holding expired cert %p",
1456 /* OK, we'll use this one (preferred over an expired issuer) */
1463 tpDbDebug("findIssuerForCertOrCrl: using expired cert %p", expiredIssuer);
1475 * we always try to find a valid cert to replace an expired or
1564 /* possible expired roo
[all...]
/macosx-10.10/CPANInternal-159.1/Log-Log4perl-1.40/lib/Log/Log4perl/Config/
H A DWatch.pm293 regardless if C<check_interval> has expired or not, call
/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/
H A Disakmp_inf.c571 int expired = oakley_find_status_in_certchain(iph1->cert, CERT_STATUS_EXPIRED);
576 } else if (expired) {
578 plog(ASL_LEVEL_NOTICE, ">>> Server reports client's certificate is expired\n");
589 int expired = oakley_find_status_in_certchain(iph1->cert_p, CERT_STATUS_EXPIRED);
596 } else if (expired) {
598 plog(ASL_LEVEL_NOTICE, ">>> Server's certificate is expired\n");
570 int expired = oakley_find_status_in_certchain(iph1->cert, CERT_STATUS_EXPIRED); local
588 int expired = oakley_find_status_in_certchain(iph1->cert_p, CERT_STATUS_EXPIRED); local
/macosx-10.10/emacs-93/emacs/lisp/gnus/
H A Dmml2015.el433 (let* ((expired (re-search-forward
455 (when expired
456 (format "\nWARNING: Signature from expired key (%s)"

Completed in 322 milliseconds

12