Home
last modified time | relevance | path

Searched full:expired (Results 1 – 25 of 780) sorted by relevance

12345678910>>...32

/freebsd/contrib/pam-krb5/tests/module/
H A Dexpired-t.c2 * Tests for the pam-krb5 module with an expired password.
5 * expired and the multiple different paths the module can take for handling
87 run_script("data/scripts/expired/basic-heimdal", &config); in main()
91 run_script("data/scripts/expired/basic-heimdal-debug", &config); in main()
93 run_script("data/scripts/expired/basic-heimdal-old", &config); in main()
97 run_script("data/scripts/expired/basic-heimdal-old-debug", &config); in main()
100 run_script("data/scripts/expired/basic-mit", &config); in main()
104 run_script("data/scripts/expired/basic-mit-debug", &config); in main()
112 run_script("data/scripts/expired/basic-heimdal-silent", &config); in main()
116 run_script("data/scripts/expired/basic-heimdal-flag-silent", &config); in main()
[all …]
/freebsd/crypto/openssh/regress/
H A Dsshsig.sh163 # key expired
164 trace "$tid: key type $t verify with expired lifespan"
169 fail "failed signature for $t with expired key"
171 trace "$tid: key type $t verify with expired lifespan (now)"
175 fail "failed signature for $t with expired key"
189 # key expired
190 trace "$tid: key type $t find-principals with expired lifespan"
194 fail "failed find-principals for $t with expired key"
196 trace "$tid: key type $t find-principals with expired lifespan (now)"
199 fail "failed find-principals for $t with expired key"
[all …]
/freebsd/contrib/pam-krb5/tests/data/scripts/expired/
H A Ddefer-mit-debug1 # Test deferring handling of expired passwords. -*- conf -*-
33 DEBUG (user %u) krb5_get_init_creds_password: Password has expired
34 DEBUG (user %u) expired account, deferring failure
35 INFO user %u authenticated as %0 (expired)
38 INFO user %u account password is expired
H A Ddefer-mit1 # Test deferring handling of expired passwords. -*- conf -*-
30 INFO user %u authenticated as %0 (expired)
31 INFO user %u account password is expired
/freebsd/crypto/openssh/
H A Dauth-shadow.c52 * Check if specified account is expired. Returns 1 if account is expired,
70 logit("Account %.100s has expired", spw->sp_namp); in auth_shadow_acctexpired()
85 * Returns: 1 = password expired, 0 = password not expired
124 logit("User %.100s password has expired (root forced)", user); in auth_shadow_pwexpired()
129 logit("User %.100s password has expired (password aged)", user); in auth_shadow_pwexpired()
/freebsd/crypto/heimdal/lib/krb5/
H A Dkrb_err.et12 ec KDC_NAME_EXP, "Kerberos 4 principal expired"
13 ec KDC_SERVICE_EXP, "Kerberos 4 service expired"
14 ec KDC_AUTH_EXP, "Kerberos 4 auth expired"
27 ec MK_AP_TGTEXP, "Kerberos 4 TGT Expired"
30 ec RD_AP_EXP, "Kerberos 4 ticket expired"
/freebsd/crypto/krb5/src/tests/
H A Dt_kdc_log.py3 # Make a TGS request with an expired ticket.
16 fail('Client principal not logged in expired-ticket TGS request')
19 fail('Did not find KDC log line for expired-ticket TGS request')
/freebsd/crypto/krb5/src/util/et/
H A Dtest_et.c27 printf("Msg TGT-expired is '%s'\n", error_message(KRB_MK_AP_TGTEXP)); in main()
37 printf("With 0: tgt-expired -> %s\n", error_message(KRB_MK_AP_TGTEXP)); in main()
49 printf("With krb: tgt-expired -> %s\n", in main()
62 printf("Msg for TGT-expired is '%s'\n", in main()
/freebsd/contrib/unbound/services/cache/
H A Drrset.c131 /* o if new data is expired, cached data is better */ in need_to_update_rrset()
152 /* o item in cache has expired */ in need_to_update_rrset()
159 * update to fetch the latest data. ttl is not expired, because in need_to_update_rrset()
428 return; /* expired, or rrset has changed in the meantime */ in rrset_check_sec_status()
469 /* looks up with a time of 0, to see expired entries */ in rrset_cache_remove_above()
474 int expired = (now > data->ttl); in rrset_cache_remove_above() local
476 if(expired) in rrset_cache_remove_above()
479 "removed (expired)", in rrset_cache_remove_above()
507 /* looks up with a time of 0, to see expired entries */ in rrset_cache_expired_above()
513 /* it is expired, this is not wanted */ in rrset_cache_expired_above()
[all …]
H A Ddns.h81 * @param leeway: TTL value, if not 0, other rrsets are considered expired
113 * @param leeway: TTL value, if not 0, other rrsets are considered expired
140 * @param noexpiredabove: if set, no expired NS rrsets above the one found
161 * @param allow_expired: if true and serve-expired is enabled, it will allow
162 * for expired dns_msg to be generated based on the configured serve-expired
/freebsd/contrib/unbound/cachedb/
H A Dcachedb.c396 * overwriting expired, valid, content with broken content. */ in prep_data()
404 /* We don't store the reply if its TTL is 0 unless serve-expired is in prep_data()
459 /* Check if we are allowed to return expired entries: in good_expiry_and_qinfo()
602 /* see how much of the TTL expired, and remove it */ in parse_data()
609 verbose(VERB_ALGO, "cachedb msg expired"); in parse_data()
611 /* If serve-expired is enabled, we still use an expired message in parse_data()
620 return 0; /* message expired */ in parse_data()
630 /* Similar to the unbound worker, if serve-expired is enabled and in parse_data()
631 * the msg would be considered to be expired, mar in parse_data()
[all...]
/freebsd/contrib/llvm-project/lldb/source/Host/common/
H A DAlarm.cpp103 // case, the thread will wake up as scheduled, find no expired events, and in Cancel()
149 // 1. The timeout for the next alarm expired. in AlarmThread()
162 // The timeout for the next alarm expired. in AlarmThread()
168 // Iterate over all the callbacks. Call the ones that have expired in AlarmThread()
186 // either the predicate is true or we woke up because an alarm expired. in AlarmThread()
197 // A new alarm was added or an alarm expired. Either way we need to in AlarmThread()
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_flush_sessions.pod5 SSL_CTX_flush_sessions - remove expired sessions
16 B<ctx> to remove sessions expired at time B<tm>.
22 As sessions will not be reused ones they are expired, they should be
/freebsd/crypto/krb5/src/lib/krb5/error_tables/
H A Dkrb5_err.et42 error_code KRB5KDC_ERR_NAME_EXP, "Client's entry in database has expired"
43 error_code KRB5KDC_ERR_SERVICE_EXP, "Server's entry in database has expired"
64 error_code KRB5KDC_ERR_KEY_EXP, "Password has expired"
75 error_code KRB5KRB_AP_ERR_TKT_EXPIRED, "Ticket expired"
134 error_code KRB5KDC_ERR_PREAUTH_EXPIRED, "Preauthentication expired"
318 error_code KRB5_APPL_EXPIRED, "This application has expired"
319 error_code KRB5_LIB_EXPIRED, "This Krb5 library has expired"
/freebsd/crypto/heimdal/kuser/
H A Dklist.c97 rtbl_add_column_entry(ct, COL_EXPIRES, N_(">>>Expired<<<", "")); in print_cred()
192 printf(N_(" (expired)", "")); in print_cred_verbose()
341 int expired; in check_for_tgt() local
361 expired = time(NULL) > creds.times.endtime; in check_for_tgt()
368 return expired; in check_for_tgt()
429 strlcpy (buf2, N_(">>> Expired <<<", ""), sizeof(buf2)); in display_tokens()
518 int expired = 0; in list_caches() local
526 expired = check_for_tgt (context, id, principal, &t); in list_caches()
535 if (expired) in list_caches()
536 str = N_(">>> Expired <<<", ""); in list_caches()
/freebsd/contrib/openpam/doc/man/
H A Dpam.3143 the user's request or because the password has expired.
165 User account has expired.
173 Password has expired.
195 User credentials have expired.
/freebsd/contrib/pam-krb5/docs/
H A Ddocknot.yaml183 implementation of your KDC for the module/expired test to work, since the
188 Several `module/expired` tests are expected to fail with Heimdal 1.5 due
190 library-mediated password change of an expired password. This is fixed in
322 password change of an expired account during authentication. Supporting
323 password change for expired accounts on Solaris with native Kerberos may
334 password if their password is expired, but when using OpenSSH, this will
340 expired will not be prompted to change their password unless the KDC
471 standard for handling expired accounts and instead returns failure from
491 therefore a ticket cache since the password is expired. But
497 processing an expired password, and `pam_chauthtok`, if it sees that
[all …]
/freebsd/contrib/pam-krb5/module/
H A Dpassword.c333 * Kerberos password expired but the other one didn't?), but warning in pamk5_password()
337 if (ctx->expired && ctx->creds == NULL) in pamk5_password()
339 pamk5_conv(args, "Password expired. You must change it now.", in pamk5_password()
351 * If we were handling a forced password change for an expired password, in pamk5_password()
353 * clear the expired flag in the context. in pamk5_password()
355 if (pamret == PAM_SUCCESS && ctx->expired) { in pamk5_password()
375 ctx->expired = false; in pamk5_password()
H A Daccount.c44 /* If the account was expired, here's where we actually fail. */ in pamk5_account()
46 if (ctx->expired) { in pamk5_account()
47 pam_syslog(args->pamh, LOG_INFO, "user %s account password is expired", in pamk5_account()
/freebsd/contrib/unbound/util/data/
H A Dmsgreply.h156 * TTL for prefetch. After it has expired, a prefetch is suitable.
162 * Reply TTL extended with serve expired TTL, to limit time to serve
163 * expired message.
168 * TTL for an expired entry to be used without attempting recursion
170 * This is just an efficiency timer when serve-expired-client-timeout
172 * expired entry instead of trying resolution first.
258 * @param expttl: serve expired ttl
259 * @param norecttl: serve expired no recursion ttl
416 * Check if an *expired* (checked by the caller already) reply info can be used
417 * as an expired answe
[all...]
/freebsd/crypto/krb5/src/lib/krb5/rcache/
H A Drc_file2.c126 /* Return true if timestamp is expired, for the current timestamp (now) and
129 expired(uint32_t timestamp, uint32_t now, uint32_t skew) in expired() function
182 * the end of the file, or expired). */ in store()
184 if (nread == 0 || !r1stamp || expired(r1stamp, now, skew)) in store()
186 else if (nread == 1 || !r2stamp || expired(r2stamp, now, skew)) in store()
/freebsd/crypto/krb5/doc/admin/
H A Dtroubleshoot.rst85 Cannot create cert chain: certificate has expired
90 the signing chain above them has expired.
92 If the KDC certificate has expired, this message appears in the KDC
98 If the client or a signing certificate has expired, this message may
/freebsd/crypto/krb5/doc/html/_sources/admin/
H A Dtroubleshoot.rst.txt85 Cannot create cert chain: certificate has expired
90 the signing chain above them has expired.
92 If the KDC certificate has expired, this message appears in the KDC
98 If the client or a signing certificate has expired, this message may
/freebsd/crypto/openssh/openbsd-compat/
H A Dport-aix.c180 int r, authsuccess = 0, expired, reenter, result; in sys_auth_passwd() local
203 * Check if the user's password is expired. in sys_auth_passwd()
205 expired = passwdexpired(name, &msg); in sys_auth_passwd()
213 debug3("AIX/passwdexpired returned %d msg %.100s", expired, msg); in sys_auth_passwd()
215 switch (expired) { in sys_auth_passwd()
216 case 0: /* password not expired */ in sys_auth_passwd()
218 case 1: /* expired, password change required */ in sys_auth_passwd()
/freebsd/contrib/pam-krb5/
H A DREADME192 implementation of your KDC for the module/expired test to work, since
197 Several module/expired tests are expected to fail with Heimdal 1.5 due
199 library-mediated password change of an expired password. This is fixed
321 password change of an expired account during authentication. Supporting
322 password change for expired accounts on Solaris with native Kerberos may
333 password if their password is expired, but when using OpenSSH, this will
339 expired will not be prompted to change their password unless the KDC
465 standard for handling expired accounts and instead returns failure from
483 therefore a ticket cache since the password is expired. But
489 processing an expired password, and pam_chauthtok, if it sees that flag,
[all …]

12345678910>>...32