/freebsd/crypto/heimdal/lib/krb5/ |
H A D | krb_err.et | 12 ec KDC_NAME_EXP, "Kerberos 4 principal expired" 13 ec KDC_SERVICE_EXP, "Kerberos 4 service expired" 14 ec KDC_AUTH_EXP, "Kerberos 4 auth expired" 30 ec RD_AP_EXP, "Kerberos 4 ticket expired"
|
H A D | krb5_err.et | 12 error_code NAME_EXP, "Client's entry in database has expired" 13 error_code SERVICE_EXP, "Server's entry in database has expired" 34 error_code KEY_EXPIRED, "Password has expired" 45 error_code ERR_TKT_EXPIRED, "Ticket expired"
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_flush_sessions.pod | 5 SSL_CTX_flush_sessions - remove expired sessions 16 B<ctx> to remove sessions expired at time B<tm>. 22 As sessions will not be reused ones they are expired, they should be
|
H A D | SSL_alert_type_string.pod | 40 non-fatal errors are certificate errors ("certificate expired", 117 =item "CE"/"certificate expired" 119 A certificate has expired or is not currently valid.
|
H A D | X509_STORE_CTX_set_verify_cb.pod | 115 Simple example, suppose a certificate in the chain is expired and we wish 127 expired just one specific case:
|
H A D | SSL_CTX_sess_set_cache_size.pod | 33 expired sessions.
|
H A D | SSL_SESSION_get_time.pod | 44 Sessions are expired by examining the creation time and the timeout value.
|
H A D | SSL_CTX_load_verify_locations.pod | 119 with different expiration dates. If a "certificate expired" verification 121 have expired certificates mixed with valid ones.
|
H A D | X509_STORE_CTX_get_error.pod | 154 =item B<X509_V_ERR_CERT_HAS_EXPIRED: certificate has expired> 156 The certificate has expired: that is the C<notAfter> date is before the 163 =item B<X509_V_ERR_CRL_HAS_EXPIRED: CRL has expired> 165 The CRL has expired.
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | port-aix.c | 180 int r, authsuccess = 0, expired, reenter, result; in sys_auth_passwd() local 205 expired = passwdexpired(name, &msg); in sys_auth_passwd() 213 debug3("AIX/passwdexpired returned %d msg %.100s", expired, msg); in sys_auth_passwd() 215 switch (expired) { in sys_auth_passwd()
|
/freebsd/crypto/heimdal/kuser/ |
H A D | klist.c | 341 int expired; in check_for_tgt() local 361 expired = time(NULL) > creds.times.endtime; in check_for_tgt() 368 return expired; in check_for_tgt() 518 int expired = 0; in list_caches() local 526 expired = check_for_tgt (context, id, principal, &t); in list_caches() 535 if (expired) in list_caches()
|
/freebsd/crypto/openssl/test/ |
H A D | cmp_vfy_test.c | 215 static int test_validate_msg_signature_partial_chain(int expired) in test_validate_msg_signature_partial_chain() argument 222 fixture->expected = !expired; in test_validate_msg_signature_partial_chain() 231 if (expired) in test_validate_msg_signature_partial_chain() 384 static void setup_path(CMP_VFY_TEST_FIXTURE **fixture, X509 *wrong, int expired) in setup_path() argument 387 (*fixture)->expected = wrong == NULL && !expired; in setup_path() 388 if (expired) { in setup_path()
|
/freebsd/contrib/unbound/daemon/ |
H A D | remote.c | 1765 time_t expired; member 1794 if(d->ttl > inf->expired) { in infra_del_host() 1795 d->ttl = inf->expired; in infra_del_host() 1823 inf.expired = *worker->env.now; in do_flush_infra() 1824 inf.expired -= 3; /* handle 3 seconds skew between threads */ in do_flush_infra() 1854 if(d->ttl > inf->expired) { in zone_del_rrset() 1855 d->ttl = inf->expired; in zone_del_rrset() 1870 if(d->ttl > inf->expired) { in zone_del_msg() 1871 d->ttl = inf->expired; in zone_del_msg() 1872 d->prefetch_ttl = inf->expired; in zone_del_msg() [all …]
|
/freebsd/crypto/heimdal/doc/ |
H A D | init-creds | 77 changing an expired password, preauthentication. 106 input is required, such as if the user's password has expired and 118 expired and must be changed" or "Enter Activcard response for 341 getting an in_tkt, if the password is expired, the request should be 343 If this says expired, too, then the password should be changed, and 345 If the master times out, then a message that the password has expired
|
/freebsd/contrib/jemalloc/include/jemalloc/internal/ |
H A D | prof_structs.h | 151 bool expired; member
|
/freebsd/contrib/unbound/doc/ |
H A D | example.conf.in | 624 # if yes, perform prefetching of almost expired message cache entries. 732 # Serve expired responses from cache, with serve-expired-reply-ttl in 734 # serve-expired: no 736 # Limit serving of expired responses to configured seconds after 738 # serve-expired-ttl: 0 740 # Set the TTL of expired records to the serve-expired-ttl value after a 742 # that the expired records will be served as long as there are queries 744 # serve-expired-ttl-reset: no 746 # TTL value to use when replying with expired data. 747 # serve-expired-reply-ttl: 30 [all …]
|
/freebsd/contrib/unbound/util/ |
H A D | configlexer.lex | 412 serve-expired{COLON} { YDVAR(1, VAR_SERVE_EXPIRED) } 413 serve-expired-ttl{COLON} { YDVAR(1, VAR_SERVE_EXPIRED_TTL) } 414 serve-expired-ttl-reset{COLON} { YDVAR(1, VAR_SERVE_EXPIRED_TTL_RESET) } 415 serve-expired-reply-ttl{COLON} { YDVAR(1, VAR_SERVE_EXPIRED_REPLY_TTL) } 416 serve-expired-client-timeout{COLON} { YDVAR(1, VAR_SERVE_EXPIRED_CLIENT_TIMEOUT) } 417 ede-serve-expired{COLON} { YDVAR(1, VAR_EDE_SERVE_EXPIRED) } 575 cachedb-check-when-serve-expired{COLON} { YDVAR(1, VAR_CACHEDB_CHECK_WHEN_SERVE_EXPIRED) }
|
/freebsd/lib/libc/nls/ |
H A D | C.msg | 256 26 Virtual timer expired 258 27 Profiling timer expired
|
H A D | fr_FR.ISO8859-1.msg | 238 26 Virtual timer expired 240 27 Profiling timer expired
|
/freebsd/contrib/llvm-project/lldb/include/lldb/Breakpoint/ |
H A D | BreakpointResolver.h | 64 auto breakpoint_sp = m_breakpoint.expired() ? lldb::BreakpointSP() : in GetBreakpoint()
|
/freebsd/contrib/blocklist/diff/ |
H A D | ftpd.diff | 78 reply(530, "%s", rval == 2 ? "Password expired." :
|
/freebsd/contrib/dialog/ |
H A D | ui_getc.c | 454 time_t expired = time((time_t *) 0) + dialog_vars.timeout_secs; in dlg_getc() local 498 && current >= expired) { in dlg_getc()
|
/freebsd/contrib/sendmail/src/ |
H A D | domain.c | 498 bool isrname, expired; local 508 expired = false; 569 expired = true; 579 if ((0 == (TLSAFLNEW & flags)) && !expired)
|
/freebsd/contrib/unbound/services/cache/ |
H A D | rrset.c | 474 int expired = (now > data->ttl); in rrset_cache_remove_above() local 476 if(expired) in rrset_cache_remove_above()
|
/freebsd/crypto/heimdal/lib/kadm5/ |
H A D | kadm5_err.et | 37 error_code PASS_TOOSOON, "Current password's minimum life has not expired"
|