| /freebsd/contrib/wpa/src/ap/ |
| H A D | pmksa_cache_auth.c | 118 while (pmksa->pmksa && pmksa->pmksa->expiration <= now.sec) { in pmksa_cache_expire() 137 sec = pmksa->pmksa->expiration - now.sec; in pmksa_cache_set_expiration() 235 if (pos->expiration > entry->expiration) in pmksa_cache_link_entry() 350 entry->expiration = now.sec; in pmksa_cache_auth_create_entry() 352 entry->expiration += session_timeout; in pmksa_cache_auth_create_entry() 354 entry->expiration += dot11RSNAConfigPMKLifetime; in pmksa_cache_auth_create_entry() 413 entry->expiration = old_entry->expiration; in pmksa_cache_add_okc() 676 (int) (entry->expiration - now.sec), in pmksa_cache_auth_list() 741 (int) (entry->expiration - now.sec)); in pmksa_cache_auth_list_mesh()
|
| H A D | pmksa_cache_auth.h | 24 os_time_t expiration; member
|
| /freebsd/contrib/wpa/src/common/ |
| H A D | ptksa_cache.c | 50 if (e->expiration > now.sec) in ptksa_cache_expire() 82 sec = e->expiration - now.sec; in ptksa_cache_set_expiration() 192 e->expiration - now.sec); in ptksa_cache_list() 316 entry->expiration = now.sec + life_time; in ptksa_cache_add() 319 if (tmp->expiration > entry->expiration) { in ptksa_cache_add()
|
| H A D | ptksa_cache.h | 23 os_time_t expiration; member
|
| /freebsd/contrib/wpa/src/rsn_supp/ |
| H A D | pmksa_cache.c | 97 while (entry && entry->expiration <= now.sec) { in pmksa_cache_expire() 168 sec = pmksa->pmksa->expiration - now.sec; in pmksa_cache_set_expiration() 181 sec = entry->expiration - now.sec; in pmksa_cache_set_expiration() 273 entry->expiration = now.sec + pmk_lifetime; in pmksa_cache_add() 368 if (pos->expiration > entry->expiration) in pmksa_cache_add_entry() 506 os_time_t old_expiration = old_entry->expiration; in pmksa_cache_clone_entry() 526 new_entry->expiration = old_expiration; in pmksa_cache_clone_entry() 763 (int) (entry->expiration - now.sec), in pmksa_cache_list() 836 if (entry->expiration - now.sec < 1 || in pmksa_cache_reconfig() 840 life_time = entry->expiration - now.sec; in pmksa_cache_reconfig()
|
| H A D | pmksa_cache.h | 22 os_time_t expiration; member
|
| /freebsd/crypto/krb5/src/kadmin/dbutil/ |
| H A D | kdb5_create.c | 72 krb5_timestamp expiration; member 172 rblock.expiration = global_params.expiration; in kdb5_create() 396 entry->expiration = pblock->expiration; in add_principal()
|
| /freebsd/crypto/heimdal/kadmin/ |
| H A D | kadmin-commands.in | 172 long = "expiration-time" 175 help = "principal expiration time" 178 long = "pw-expiration-time" 181 help = "password expiration time" 327 long = "expiration-time" 330 help = "principal expiration time" 333 long = "pw-expiration-time" 336 help = "password expiration time"
|
| H A D | util.c | 438 const char *expiration, in set_entry() argument 457 if (expiration) { in set_entry() 458 if (parse_timet (expiration, &ent->princ_expire_time, in set_entry() 460 krb5_warnx (contextp, "unable to parse `%s'", expiration); in set_entry()
|
| H A D | ank.c | 75 const char *expiration, in add_one_principal() argument 97 expiration, pw_expiration, attributes); in add_one_principal()
|
| /freebsd/contrib/ntp/scripts/update-leap/ |
| H A D | update-leap-opts | 35 'expiration' => '', 44 'expiration|e=s', 'ntp-conf-file|f=s', 'force-update|F', 55 -e, --expiration=str Refresh the leapfile this long before it expires
|
| H A D | invoke-update-leap.texi | 49 * update-leap expiration:: expiration option (-e) 81 -e Specify how long (in days) before expiration the file is to be 206 @node update-leap expiration 207 @subsection expiration option (-e) 208 @cindex update-leap-expiration 212 Specify how long before expiration the file is to be refreshed
|
| H A D | update-leap-opts.def | 71 name = expiration; 76 Specify how long before expiration the file is to be refreshed
|
| /freebsd/usr.sbin/bsdconfig/usermgmt/include/ |
| H A D | messages.subr | 35 …expiration time. Format is one of:\n\n a) decimal for UNIX time since %s\n b) dd-mmm-yy[yy] for da… 98 …expiration time. Format is one of:\n\n a) decimal for UNIX time since %s\n b) dd-mmm-yy[yy] for da…
|
| /freebsd/crypto/krb5/src/util/support/ |
| H A D | cache-addrinfo.h | 117 time_t expiration; member
|
| H A D | fake-addrinfo.c | 583 entry->expiration = time(0) + CACHE_ENTRY_LIFETIME; in plant_face() 587 name, entry, entry->naddrs4, entry->naddrs6, entry->expiration); in plant_face() 606 fp, fp->expiration); in find_face() 608 if (fp->expiration < now) { in find_face() 711 ce->expiration = time(0) + 30; in fai_add_hosts_by_name()
|
| /freebsd/crypto/krb5/src/plugins/kdb/ldap/ldap_util/ |
| H A D | kdb5_ldap_realm.h | 42 krb5_timestamp expiration; member
|
| /freebsd/crypto/krb5/src/lib/rpc/ |
| H A D | svc_auth_gssapi.c | 86 uint32_t expiration; member 712 client_data->expiration = time(0) + INITIATION_TIMEOUT; in create_client() 764 client_data->expiration = exp; in client_expire() 887 (void *) client_data, client_data->expiration)); in dump_db() 908 if (client_data->expiration < time(0)) { in clean_client()
|
| /freebsd/crypto/krb5/src/lib/kadm5/ |
| H A D | alt_prof.c | 584 params.expiration = params_in->expiration; in kadm5_get_config_params() 587 if (!krb5_string_to_timestamp(svalue, ¶ms.expiration)) { in kadm5_get_config_params() 593 params.expiration = 0; in kadm5_get_config_params()
|
| /freebsd/sys/contrib/device-tree/Bindings/watchdog/ |
| H A D | marvel.txt | 34 - interrupts : Contains the IRQ for watchdog expiration
|
| /freebsd/crypto/heimdal/kuser/ |
| H A D | klist.c | 335 time_t *expiration) in check_for_tgt() argument 363 if (expiration) in check_for_tgt() 364 *expiration = creds.times.endtime; in check_for_tgt()
|
| /freebsd/crypto/krb5/src/lib/kdb/ |
| H A D | kdb_convert.c | 63 if (current->expiration != new->expiration) in find_changed_attrs() 390 if (entry->expiration >= 0) { in ulog_conv_2logentry() 392 ULOG_ENTRY(update, final).av_exp = (uint32_t)entry->expiration; in ulog_conv_2logentry() 619 ent->expiration = (krb5_timestamp) u.av_exp; in ulog_conv_2dbentry()
|
| /freebsd/crypto/krb5/src/plugins/kdb/lmdb/ |
| H A D | marshal.c | 64 k5_buf_add_uint32_le(&buf, entry->expiration); in klmdb_encode_princ() 195 entry->expiration = k5_input_get_uint32_le(&in); in klmdb_decode_princ()
|
| /freebsd/crypto/krb5/src/plugins/kdb/db2/ |
| H A D | kdb_xdr.c | 137 krb5_kdb_encode_int32(entry->expiration, nextloc); in krb5_encode_princ_entry() 276 krb5_kdb_decode_int32(nextloc, entry->expiration); in krb5_decode_princ_entry()
|
| /freebsd/contrib/pam-krb5/ |
| H A D | TODO | 37 * Fix password expiration handling for the search_k5login and 39 that would trigger password expiration handling, which probably isn't
|