Searched refs:pw_end (Results 1 – 15 of 15) sorted by relevance
/freebsd/crypto/heimdal/lib/hdb/ |
H A D | hdb-ldap.c | 546 if (ent->entry.pw_end) { in LDAP_entry2mods() 547 if (orig.entry.pw_end == NULL || (*(ent->entry.pw_end) != *(orig.entry.pw_end))) { in LDAP_entry2mods() 551 ent->entry.pw_end); in LDAP_entry2mods() 559 *(ent->entry.pw_end)); in LDAP_entry2mods() 1227 ent->entry.pw_end = malloc(sizeof(*ent->entry.pw_end)); in LDAP_message2entry() 1228 if (ent->entry.pw_end == NULL) { in LDAP_message2entry() 1234 ent->entry.pw_end); in LDAP_message2entry() [all...] |
H A D | print.c | 180 if(ent->pw_end) in entry2string_int() 181 append_string(context, sp, "%s ", time2str(*ent->pw_end)); in entry2string_int()
|
H A D | hdb-mitdb.c | 271 entry->pw_end = malloc(sizeof(*entry->pw_end)); in mdb_value2entry() 272 *entry->pw_end = u32; in mdb_value2entry()
|
/freebsd/crypto/heimdal/lib/kadm5/ |
H A D | bump_pw_expire.c | 46 if (ent->pw_end != NULL) { in _kadm5_bump_pw_expire() 56 *(ent->pw_end) = time(NULL) + life; in _kadm5_bump_pw_expire()
|
H A D | log.c | 607 if (log_ent.entry.pw_end == NULL) { in kadm5_log_replay_modify() 608 ent.entry.pw_end = NULL; in kadm5_log_replay_modify() 610 if (ent.entry.pw_end == NULL) { in kadm5_log_replay_modify() 611 ent.entry.pw_end = malloc(sizeof(*ent.entry.pw_end)); in kadm5_log_replay_modify() 612 if (ent.entry.pw_end == NULL) { in kadm5_log_replay_modify() 618 *ent.entry.pw_end = *log_ent.entry.pw_end; in kadm5_log_replay_modify()
|
H A D | ent_setup.c | 152 set_value(ent->entry.pw_end, princ->pw_expiration); in _kadm5_setup_entry() 154 set_null(ent->entry.pw_end); in _kadm5_setup_entry()
|
H A D | get_s.c | 95 if(mask & KADM5_PW_EXPIRATION && ent.entry.pw_end) in kadm5_s_get_principal() 96 out->pw_expiration = *ent.entry.pw_end; in kadm5_s_get_principal()
|
H A D | iprop-log.c | 205 if(ent.pw_end == NULL) { in print_entry() 209 localtime(ent.pw_end)); in print_entry()
|
/freebsd/crypto/heimdal/kadmin/ |
H A D | load.c | 47 char *pw_end; member 430 e.pw_end = p; in doit() 489 if (parse_time_string_alloc (&ent.entry.pw_end, e.pw_end) == -1) { in doit() 491 filename, line, e.pw_end); in doit()
|
/freebsd/crypto/heimdal/kdc/ |
H A D | kerberos5.c | 791 if (client->pw_end && *client->pw_end < kdc_time in kdc_check_flags() 794 krb5_format_time(context, *client->pw_end, in kdc_check_flags() 851 if (server->pw_end && *server->pw_end < kdc_time) { in kdc_check_flags() 853 krb5_format_time(context, *server->pw_end, in kdc_check_flags() 1623 if (client->entry.pw_end in _kdc_as_rep() 1625 || kdc_time + config->kdc_warn_pwexpire >= *client->entry.pw_end)) { in _kdc_as_rep() 1627 ek.last_req.val[ek.last_req.len].lr_value = *client->entry.pw_end; in _kdc_as_rep() 1641 if (client->entry.valid_end || client->entry.pw_end) { in _kdc_as_rep() 1644 if (client->entry.pw_end) in _kdc_as_rep() 1646 *client->entry.pw_end); in _kdc_as_rep() [all …]
|
H A D | mit_dump.c | 298 ALLOC(ent.entry.pw_end); in mit_prop_dump() 299 *ent.entry.pw_end = tmp; in mit_prop_dump()
|
H A D | krb5tgs.c | 1967 free(s4u2self_impersonated_client->entry.pw_end); in tgs_build_reply() 1968 s4u2self_impersonated_client->entry.pw_end = NULL; in tgs_build_reply()
|
/freebsd/crypto/heimdal/ |
H A D | ChangeLog.2000 | 1071 and not `pw_end' 1073 * kdc/kadb.h (ka_entry): fix name pw_end -> valid_end. add some
|
H A D | ChangeLog.1998 | 2211 Send an lr_type == 6 with pw_end. 2212 Set key.expiration to min(valid_end, pw_end)
|
H A D | ChangeLog.2006 | 1217 config->kdc_warn_pwexpire is past pw_end, add expiration
|