| /freebsd/crypto/openssh/ |
| H A D | srclimit.c | 56 time_t expiry; member 208 if (a->expiry != b->expiry) in penalty_expiry_cmp() 209 return a->expiry < b->expiry ? -1 : 1; in penalty_expiry_cmp() 223 if (penalty->expiry >= now) in expire_penalties_from_tree() 300 if (penalty->expiry < now) { in srclimit_penalty_check_allow() 421 penalty->expiry = now + penalty_secs; in srclimit_penalise() 439 addrnetmask, (long long)(existing->expiry - now)); in srclimit_penalise() 440 /* Expiry information is about to change, remove from tree */ in srclimit_penalise() 444 existing->expiry += penalty_secs; in srclimit_penalise() 445 if (existing->expiry - now > penalty_cfg.penalty_max) in srclimit_penalise() [all …]
|
| H A D | auth-shadow.c | 47 * For the account and password expiration functions, we assume the expiry 84 * Checks password expiry for platforms that use shadow passwd files. 110 /* Test for Trusted Mode expiry disabled */ in auth_shadow_pwexpired()
|
| /freebsd/contrib/unbound/cachedb/ |
| H A D | cachedb.c | 383 uint64_t timestamp, expiry; in prep_data() 429 * as the packet expiry time */ in prep_data() 432 expiry = timestamp + (uint64_t)qstate->return_msg->rep->ttl; in prep_data() 434 expiry = htobe64(expiry); in prep_data() 436 if(oldlim + sizeof(timestamp)+sizeof(expiry) >= in prep_data() 439 sldns_buffer_set_limit(buf, oldlim + sizeof(timestamp)+sizeof(expiry)); in prep_data() 441 sldns_buffer_write_at(buf, oldlim+sizeof(timestamp), &expiry, in prep_data() 442 sizeof(expiry)); in prep_data() 447 /** check expiry, retur 381 uint64_t timestamp, expiry; prep_data() local 449 uint64_t expiry; good_expiry_and_qinfo() local 543 uint64_t timestamp, expiry; parse_data() local [all...] |
| /freebsd/crypto/openssh/regress/ |
| H A D | key-options.sh | 111 verbose "key option expiry-time $which" 121 check_valid_before "invalid" 'expiry-time="INVALID"' "fail" 122 check_valid_before "expired" 'expiry-time="19990101"' "fail" 124 check_valid_before "valid" 'expiry-time="20380101"' "pass" 126 check_valid_before "valid-64b" 'expiry-time="25250101"' "pass"
|
| H A D | sshsig.sh | 155 fail "failed signature for $t key with valid expiry interval" 182 fail "failed find-principals for $t key with valid expiry interval" 358 fail "failed find-principals for $t key with valid expiry interval" 460 fail "failed signature for $t key with valid CA expiry interval" 467 fail "accepted signature for $t key with valid CA expiry interval but not yet valid cert" 474 fail "accepted signature for $t key with valid CA expiry interval but expired cert"
|
| H A D | penalty-expire.sh | 22 verbose "penalty expiry"
|
| /freebsd/sys/fs/nfs/ |
| H A D | nfsrvstate.h | 102 time_t lc_expiry; /* Expiry time (sec) */ 103 time_t lc_delegtime; /* Old deleg expiry (sec) */ 224 time_t expiry; member 243 #define ls_delegtime ls_un.deleg.expiry 313 time_t lug_expiry; /* Expiry time in sec */
|
| /freebsd/lib/libutil/ |
| H A D | login.conf.5 | 318 to set next password expiry date. 327 .It "warnexpire time Advance notice for pending account expiry." 328 .It "warnpassword time Advance notice for pending password expiry." 442 .It "autodelete time Time after expiry when account is auto-deleted." 446 .It "expireperiod time Time for expiry allocation."
|
| /freebsd/usr.sbin/pw/ |
| H A D | pw.c | 272 "\t-e date account expiry date\n" in cmdhelp() 273 "\t-p date password expiry date\n" in cmdhelp() 288 "\t-e period default expiry period\n" in cmdhelp() 318 "\t-e date account expiry date\n" in cmdhelp() 319 "\t-p date password expiry date\n" in cmdhelp()
|
| H A D | pwupd.h | 72 time_t expire_days; /* Days to expiry */ 73 time_t password_days; /* Days to password expiry */
|
| /freebsd/contrib/openpam/doc/man/ |
| H A D | pam.man | 70 function enforces policies such as password expiry, account expiry,
|
| H A D | pam.3 | 131 function enforces policies such as password expiry, account expiry,
|
| /freebsd/sbin/dhclient/ |
| H A D | dhclient.c | 119 * We need to check that the expiry, renewal and rebind times are not beyond 735 /* Make up some lease expiry times in state_selecting() 737 ip->client->new->expiry = cur_time + 12000; in state_selecting() 804 ip->client->new->expiry = getULong( in dhcpack() 807 ip->client->new->expiry = getULong( in dhcpack() 810 ip->client->new->expiry = default_lease_time; in dhcpack() 812 because the lease expiry offset is unsigned. Also make sure that in dhcpack() 814 if (ip->client->new->expiry < 0 || in dhcpack() 815 ip->client->new->expiry > TIME_MAX - cur_time) in dhcpack() 816 ip->client->new->expiry = TIME_MAX - cur_time; in dhcpack() [all …]
|
| /freebsd/tests/sys/netinet6/frag6/ |
| H A D | frag6_10.py | 65 # R: Timeout / Expiry. 76 # Wait for expiry.
|
| H A D | frag6_05.py | 65 # R: Silence (statistics only) or ICMPv6 timeout expiry. 80 # Wait for possible expiry to happen.
|
| /freebsd/contrib/unbound/services/cache/ |
| H A D | dns.h | 82 * that many seconds before actual TTL expiry. 114 * that many seconds before actual TTL expiry. 143 * @param expiretop: if not NULL, name where check for expiry ends for
|
| /freebsd/sys/contrib/device-tree/Bindings/watchdog/ |
| H A D | nuvoton,npcm-wdt.txt | 5 expiry.
|
| H A D | mtk-wdt.txt | 4 before the expiry.
|
| /freebsd/contrib/unbound/services/ |
| H A D | authzone.h | 119 /** fallback to the internet on failure or ttl-expiry of auth zone */ 261 /** is the zone currently considered expired? after expiry also older 277 /** expiry time (from SOA), time until zone data is not considered 280 time_t expiry; member 282 /** zone lease start time (start+expiry is expiration time). 307 /** timeout callback for next_probe or expiry(if that is sooner).
|
| /freebsd/crypto/krb5/src/lib/krb5/rcache/ |
| H A D | t_rcfile2.c | 36 * t_rcfile2 <filename> expiry <nreps> 194 if (strcmp(cmd, "expiry") == 0) { in main()
|
| H A D | Makefile.in | 46 $(RUN_TEST) ./t_rcfile2 testrcache expiry 10000
|
| /freebsd/libexec/rc/rc.d/ |
| H A D | ntpd | 150 # Leapfile expiry date. 204 $verbose Within ntp leapfile expiry limit, initiating fetch
|
| /freebsd/contrib/libpcap/ |
| H A D | pcap-dos.c | 238 struct timeval now, expiry = { 0,0 }; in pcap_read_one() local 244 expiry.tv_usec = now.tv_usec + 1000UL * p->opt.timeout; in pcap_read_one() 245 expiry.tv_sec = now.tv_sec; in pcap_read_one() 246 while (expiry.tv_usec >= 1000000L) in pcap_read_one() 248 expiry.tv_usec -= 1000000L; in pcap_read_one() 249 expiry.tv_sec++; in pcap_read_one() 331 if (timercmp(&now, &expiry, >)) in pcap_read_one()
|
| /freebsd/sys/dev/wg/ |
| H A D | wg_cookie.c | 397 sbintime_t expiry; in ratelimit_gc() 404 expiry = getsbinuptime() - ELEMENT_TIMEOUT * SBT_1S; in ratelimit_gc() 408 if (r->r_last_time < expiry || force) { in ratelimit_gc() 398 sbintime_t expiry; ratelimit_gc() local
|
| /freebsd/secure/usr.bin/openssl/man/ |
| H A D | openssl-x509.1 | 296 Prints out the expiry date of the certificate, that is the notAfter date. 299 Prints out the start and expiry dates of a certificate. 396 This allows the expiry date to be explicitly set. The format of the 410 If option \fB\-not_after\fR is set, the explicit expiry date takes precedence.
|