Searched refs:expired (Results 1 - 25 of 37) sorted by relevance

12

/macosx-10.9.5/llvmCore-3425.0.33/bindings/python/llvm/
H A Dobject.py58 # This is NOT OK. You perform a lookup after the object has expired.
61 print symbol.name # This raises because the object has expired.
188 self.expired = False
196 if self.expired:
197 raise Exception('Section instance has expired.')
204 if self.expired:
205 raise Exception('Section instance has expired.')
211 if self.expired:
212 raise Exception('Section instance has expired.')
219 if self.expired
[all...]
/macosx-10.9.5/ksh-20/ksh/src/cmd/ksh93/bltins/
H A Dsleep.c132 char *expired = (char*)handle; local
133 *expired = 1;
141 char expired = 0; local
143 tp = (void*)sh_timeradd(1000*sec, 0, completed, (void*)&expired);
155 if(expired)
156 expired = 0;
159 tp = (void*)sh_timeradd(1000*sec, 0, completed, (void*)&expired);
162 while(!expired && shp->lastsig==0);
163 if(!expired)
/macosx-10.9.5/sudo-72/src/
H A Dsiglist.in33 VTALRM Virtual timer expired
34 PROF Profiling timer expired
/macosx-10.9.5/OpenSSH-186/openssh/openbsd-compat/
H A Dport-aix.c177 int authsuccess = 0, expired, reenter, result; local
200 * Check if the user's password is expired.
202 expired = passwdexpired(name, &msg);
207 debug3("AIX/passwdexpired returned %d msg %.100s", expired, msg);
209 switch (expired) {
210 case 0: /* password not expired */
212 case 1: /* expired, password change required */
/macosx-10.9.5/ruby-104/ruby/lib/rinda/
H A Dtuplespace.rb25 # nil, or true to indicate when the tuple has expired.
43 # A TupleEntry is dead when it is canceled or expired.
46 !canceled? && !expired?
61 # Has this tuple expired? (true/false).
63 # A tuple has expired when its expiry timer based on the +sec+ argument to
66 def expired?
79 # +false+:: it has expired.
93 # +true+:: the expiry time is the start of 1970 (i.e. expired)
322 # +true+ if the TupleBag to see if it has any expired entries.
454 if entry.expired
[all...]
/macosx-10.9.5/Heimdal-323.92.1/tools/
H A Dkdc-log-analyze.pl421 } elsif (/TCP-connection from IPv[46]:([0-9\.:a-fA-F]+) expired after [0-9]+ bytes/) {
473 } elsif (/krb_rd_req: Ticket expired \(krb_rd_req\)/) {
474 } elsif (/Ticket expired \(.*\)/) {
490 } elsif (/Failed to verify AP-REQ: Ticket expired/) {
/macosx-10.9.5/ruby-104/ruby/test/rinda/
H A Dtest_rinda.rb121 assert(!tuple.expired?)
416 assert(tuple.expired?)
421 assert(!tuple.expired?)
424 assert(tuple.expired?)
430 assert(!tuple.expired?)
434 assert(!tuple.expired?)
437 assert(tuple.expired?)
/macosx-10.9.5/Heimdal-323.92.1/kuser/
H A Dklist.c196 printf(N_(" (expired)", ""));
361 int expired; local
381 expired = time(NULL) > creds.times.endtime;
388 return expired;
548 int expired = 0; local
556 expired = check_for_tgt (context, id, principal, &t);
566 if (expired)
/macosx-10.9.5/bind9-45.100/bind9/
H A Dbind.keys19 # initialize correctly, it may have expired. In that event you should
/macosx-10.9.5/WebCore-7537.78.1/platform/blackberry/
H A DCookieManager.cpp412 // If cookie does not exist and has expired, delete it
413 // If cookie exists and it has expired, so we must remove it from the map, if not update it
414 // If cookie expired and came from the BackingStore (therefore does not exist), we have to remove from database
418 // Special case for getBackingStoreCookies() to catch expired cookies
423 RefPtr<ParsedCookie> expired = curMap->removeCookie(candidateCookie, filter); local
426 if (expired && postToBackingStore != BackingStoreCookieEntry && !expired->isSession()) {
427 CookieLog("CookieManager - expired cookie is nonsession, deleting from db");
428 m_cookieBackingStore->remove(expired);
/macosx-10.9.5/WebKit2-7537.78.2/Platform/efl/
H A DWorkQueueEfl.cpp158 if (!timerWorkItems[i]->expired(current)) {
159 // If a timer work item does not expired, keep it to the m_timerWorkItems.
165 // If a timer work item expired, dispatch the function of the work item.
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/dnssec/
H A Dclean.sh35 rm -f ns3/expired.example.db ns3/update-nsec3.example.db
/macosx-10.9.5/libstdcxx-60/include/c++/4.2.1/tr1/
H A Dboost_shared_ptr.h569 * @throw bad_weak_ptr when __r.expired(),
848 if (expired())
865 return expired() ? __shared_ptr<element_type, _Lp>()
876 expired() const // never throws function in class:std::__weak_ptr
1085 if (this->expired())
1097 return this->expired() ? shared_ptr<_Tp>()
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/dnssec/ns3/
H A Dsign.sh265 # A zone with the expired signatures
267 zone=expired.example.
268 infile=expired.example.db.in
269 zonefile=expired.example.db
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/dnssec/ns2/
H A Dsign.sh35 auto-nsec auto-nsec3 secure.below-cname ttlpatch expired
/macosx-10.9.5/WebKit2-7537.78.2/Platform/
H A DWorkQueue.h175 bool expired(double currentTime) const { return currentTime >= m_expireTime; } function in class:WorkQueue::TimerWorkItem
/macosx-10.9.5/ruby-104/ruby/lib/webrick/httpauth/
H A Ddigestauth.rb338 error("%s: nonce is expired.", username)
/macosx-10.9.5/Heimdal-323.92.1/lib/sqlite/
H A Dsqlite3ext.h91 int (*expired)(sqlite3_stmt*); member in struct:sqlite3_api_routines
292 #define sqlite3_expired sqlite3_api->expired
/macosx-10.9.5/gssd-62/
H A Dgssd.c2014 krb5_find_cache_name(krb5_context kcontext, krb5_principal sprinc, int *expired) argument
2025 *expired = 0;
2066 *expired = 0;
2081 *expired = 1;
2118 int error, expired; local
2134 cname = krb5_find_cache_name(kctx, sprinc, &expired);
2137 Debug("Using ccache <%s> expired = %d\n", cname ? cname : "Default", expired);
2138 if (expired)
/macosx-10.9.5/xnu-2422.115.4/bsd/kern/
H A Dkern_credential.c1252 /* have to drop lock before freeing expired entry (it may be in use) */
1257 /* free the expired entry */
1478 * Notes: This is called even if the entry has expired; typically an
1479 * expired entry that's been looked up is about to be revalidated,
1502 * 0 Not expired
1531 * 0 Not expired
1559 * 0 Not expired
1667 * Note: The association may be expired, in which case the caller
1740 * Note: The association may be expired, in which case the caller
2483 int (* expired)(struc
[all...]
/macosx-10.9.5/bind9-45.100/bind9/bin/dnssec/
H A Ddnssec-signzone.c455 isc_boolean_t expired, future; local
468 expired = isc_serial_gt(now + cycle, rrsig.timeexpire);
470 expired = isc_serial_gt(now, rrsig.timeexpire);
485 expired ? "retained" : "dropped", sigstr);
486 if (!expired)
489 if (!expired && rrsig.originalttl == set->ttl &&
497 sigstr, expired ? "expired" :
504 if (!expired && rrsig.originalttl == set->ttl &&
512 sigstr, expired
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_x509_tp/lib/
H A DTPCertInfo.cpp1210 bool expired = false; local
1219 /* check for expired, not valid yet */
1230 expired = true;
1237 if(expired && !allowExpired) {
1423 * Temporal validity check: if we're not already holding an expired
1428 tpDebug("findIssuerForCertOrCrl: holding expired cert %p",
1456 /* OK, we'll use this one (preferred over an expired issuer) */
1463 tpDbDebug("findIssuerForCertOrCrl: using expired cert %p", expiredIssuer);
1475 * we always try to find a valid cert to replace an expired or
1564 /* possible expired roo
[all...]
/macosx-10.9.5/CPANInternal-140/Log-Log4perl-1.40/lib/Log/Log4perl/Config/
H A DWatch.pm293 regardless if C<check_interval> has expired or not, call
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/
H A Disakmp_inf.c572 int expired = oakley_find_status_in_certchain(iph1->cert, CERT_STATUS_EXPIRED);
577 } else if (expired) {
579 plog(ASL_LEVEL_NOTICE, ">>> Server reports client's certificate is expired\n");
590 int expired = oakley_find_status_in_certchain(iph1->cert_p, CERT_STATUS_EXPIRED);
597 } else if (expired) {
599 plog(ASL_LEVEL_NOTICE, ">>> Server's certificate is expired\n");
571 int expired = oakley_find_status_in_certchain(iph1->cert, CERT_STATUS_EXPIRED); local
589 int expired = oakley_find_status_in_certchain(iph1->cert_p, CERT_STATUS_EXPIRED); local
/macosx-10.9.5/emacs-92/emacs/lisp/gnus/
H A Dmml2015.el433 (let* ((expired (re-search-forward
455 (when expired
456 (format "\nWARNING: Signature from expired key (%s)"

Completed in 245 milliseconds

12