/freebsd-11-stable/contrib/unbound/edns-subnet/ |
H A D | subnetmod.c | 385 reply_info_set_ttls(rep, *qstate->env->now); 390 rep->ttl, *qstate->env->now); 426 ecs->subnet_source_mask, *env->now); 433 (struct reply_info *)node->elem, qstate->region, *env->now, 0, 658 /* CNAME response for QNAME. From now on keep track of
|
/freebsd-11-stable/sbin/hastd/ |
H A D | hastd.c | 568 /* No failures from now on. */ 822 * From now on we want to send errors to the remote node. 1074 time_t lastcheck, now; local 1118 now = time(NULL); 1119 if (lastcheck + REPORT_INTERVAL <= now) { 1121 lastcheck = now;
|
H A D | primary.c | 73 /* The is only one remote component for now. */ 1301 /* Local component is 0 for now. */ 1311 /* Remote component is 1 for now. */ 1393 /* Local component is 0 for now. */ 1395 /* Remote component is 1 for now. */ 1550 time_t lastcheck, now; local 1559 /* Remote component is 1 for now. */ 1567 now = time(NULL); 1568 if (lastcheck + HAST_KEEPALIVE <= now) { 1570 lastcheck = now; 2408 time_t lastcheck, now; local [all...] |
/freebsd-11-stable/contrib/unbound/util/ |
H A D | module.h | 481 time_t* now; member in struct:module_env
|
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | init_creds_pw.c | 190 krb5_timestamp now; local 192 krb5_timeofday (context, &now); 206 cred->times.starttime = now + start_time; 212 cred->times.endtime = now + tmp; 216 cred->times.renew_till = now + options->renew_life; 235 time_t now) 239 if (asprintf(&p, "%s%s", str, ctime(&now)) < 0 || p == NULL) 1336 * @param start_time the time the ticket should start to be valid or 0 for now. 231 report_expiration(krb5_context context, krb5_prompter_fct prompter, krb5_data *data, const char *str, time_t now) argument
|
/freebsd-11-stable/crypto/openssh/ |
H A D | clientloop.c | 316 u_int now, x11_timeout_real; local 387 now = monotime() + 1; 388 if (UINT_MAX - timeout < now) 391 x11_refuse_time = now + timeout; 534 /* If we have a pending EOF, send it now. */ 619 time_t minwait_secs = 0, server_alive_time = 0, now = monotime(); local 670 server_alive_time = now + options.server_alive_interval; 677 control_persist_exit_time - now); 1121 /* Clear the flag now. */ 1357 * buffer, no message will be sent now [all...] |
H A D | ssh-keygen.c | 1448 printf("Key now has comment '%s'\n", comment); 1450 printf("Key now has no comment\n"); 1696 parse_relative_time(const char *s, time_t now) argument 1704 if (mul == -1 && secs > now) 1706 return now + (u_int64_t)(secs * mul); 1747 time_t now = time(NULL); local 1750 /* +timespec relative to now */ 1754 cert_valid_to = now + secs; 1759 cert_valid_from = ((now - 59)/ 60) * 60; 1775 cert_valid_from = parse_relative_time(from, now); [all...] |
/freebsd-11-stable/sys/kern/ |
H A D | kern_time.c | 496 struct timespec ts, now; local 535 error = kern_clock_gettime(td, clock_id, &now); 537 timespecsub(&ts, &now); 1060 int now; local 1067 now = ticks; 1068 if (lasttime->tv_sec == 0 || (u_int)(now - lasttime->tv_sec) >= hz) { 1069 lasttime->tv_sec = now;
|
/freebsd-11-stable/sys/netgraph/ |
H A D | ng_ppp.c | 1588 fragment as lost, so we have no choice now but to drop it */ 1889 struct timeval now, age; local 1896 now.tv_sec = 0; /* uninitialized state */ 1923 if (now.tv_sec == 0) 1924 getmicrouptime(&now); 1927 age = now; 2268 struct timeval now; local 2278 getmicrouptime(&now); 2297 diff = now; 2301 alink->lastWrite = now; [all...] |
/freebsd-11-stable/contrib/unbound/daemon/ |
H A D | worker.c | 310 if(worker->err_limit_time == *worker->env.now) { 316 worker->err_limit_time = *worker->env.now; 486 time_t timenow = *worker->env.now; 639 time_t timenow = *worker->env.now; 649 /* Check if we need to serve expired now */ 768 /* cannot send the reply right now, because blocking network syscall 1198 *worker->env.now, c->buffer)) { 1411 * might need to bail out based on ACLs now. */ 1498 if((worker->env.cfg->prefetch && *worker->env.now >= 1501 *worker->env.now > [all...] |
H A D | unbound.c | 106 struct timeval now; local 110 base = ub_default_event_base(0,&t,&now);
|
/freebsd-11-stable/sbin/newfs_msdos/ |
H A D | mkfs_msdos.c | 248 time_t now; local 608 tv.tv_sec = now = o.timestamp; 610 tm = gmtime(&now); 613 now = tv.tv_sec; 614 tm = localtime(&now);
|
/freebsd-11-stable/usr.sbin/syslogd/ |
H A D | syslogd.c | 1416 static time_t now; variable 1548 now = tv.tv_sec; 1550 localtime_r(&now, ×tamp_now.tm); 1646 if ((flags & MARK) && (now - f->f_time) < MarkInterval / 2) 1658 f->f_prevcount, (long)(now - f->f_time), 1661 * If domark would have logged this by now, 1662 * flush it now (so we don't hold isolated messages), 1666 if (now > REPEATTIME(f)) { 2072 f->f_time = now; 3137 now [all...] |
/freebsd-11-stable/crypto/heimdal/kdc/ |
H A D | pkinit.c | 99 krb5_timestamp now; local 101 krb5_timeofday (context, &now); 104 if (a->ctime == 0 || abs(a->ctime - now) > context->max_skew) { 120 krb5_timestamp now; local 123 krb5_timeofday (context, &now); 126 if (a->ctime == 0 || abs(a->ctime - now) > context->max_skew) { 749 /* Signature is correct, now verify the signed message */ 1793 /* Don't support isser and anchor checking right now */
|
/freebsd-11-stable/crypto/openssl/crypto/bio/ |
H A D | bss_dgram.c | 1234 * it can be sent now. 1328 * Everything seems ok till now, so it's most likely a message 2060 } now; local 2063 SystemTimeToFileTime(&st, &now.ft); 2065 now.ul -= 116444736000000000ULL; 2067 now.ul -= 116444736000000000UI64; /* re-bias to 1/1/1970 */ 2069 t->tv_sec = (long)(now.ul / 10000000); 2070 t->tv_usec = ((int)(now.ul % 10000000)) / 10;
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | events.c | 65 struct os_reltime now; local 70 os_get_reltime(&now); 71 if (ssid->disabled_until.sec > now.sec) 72 return ssid->disabled_until.sec - now.sec; 2151 struct os_reltime now; 2158 os_get_reltime(&now); 2159 if (os_reltime_expired(&now, &wpa_s->last_scan, 5)) { 2894 struct os_reltime now, age; local 2895 os_get_reltime(&now); 2896 os_reltime_sub(&now, 4322 struct os_reltime now, diff; local [all...] |
/freebsd-11-stable/contrib/wpa/src/wps/ |
H A D | wps_registrar.c | 349 struct os_reltime now; local 351 os_get_reltime(&now); 378 pbc->timestamp = now; 385 if (os_reltime_expired(&now, &pbc->timestamp, 434 struct os_reltime now; local 436 os_get_reltime(&now); 452 if (os_reltime_expired(&now, &pbc->timestamp, 858 struct os_reltime now; local 860 os_get_reltime(&now); 864 os_reltime_before(&pin->expiration, &now)) { 1206 struct os_reltime now, dur; local [all...] |
/freebsd-11-stable/contrib/unbound/iterator/ |
H A D | iterator.c | 324 if(rep && *qstate->env->now + 328 *qstate->env->now + 345 qstate->query_flags, *qstate->env->now, 0)) 802 * copy dp, it is now part of the root prime query. 1133 * the roundtrip incurred by the DNSKEY query. The DNSKEY query is now 1309 *qstate->env->now, 1/*add SOA*/, NULL, 1425 *qstate->env->now+qstate->prefetch_leeway); 1483 iq->dp->namelen, *qstate->env->now)) { 1485 * now will also exceed the rate, keeping cache fresh */ 1488 *qstate->env->now, [all...] |
/freebsd-11-stable/contrib/bmake/mk/ |
H A D | warnings.mk | 111 # now a list of all -Wno-* overrides not just those defined by WARNINGS_SET
|
H A D | ldorder.mk | 103 # now try to find more ...
|
/freebsd-11-stable/sys/dev/ath/ath_hal/ar5416/ |
H A D | ar5416_misc.c | 206 ar5416SetCoverageClass(struct ath_hal *ah, uint8_t coverageclass, int now) argument 209 ar5212SetCoverageClass(ah, coverageclass, now); 575 /* Only support disabling RIFS delay for now */
|
/freebsd-11-stable/contrib/sendmail/src/ |
H A D | sfsasl.c | 304 ** Hack (for now): simply reduce the size, callers are (must be) 590 time_t now = curtime(); local 610 left = timeout - (now - tlsstart);
|
/freebsd-11-stable/contrib/ntp/lib/isc/ |
H A D | task.c | 115 isc_stdtime_t now; member in struct:isc__task 358 task->now = 0; 585 * We've waited until now to do it because making a task 909 *t = task->now; 1098 isc_stdtime_get(&task->now); 1158 * right now.
|
/freebsd-11-stable/crypto/heimdal/lib/ntlm/ |
H A D | ntlm.c | 1561 * @param now the time now (0 if the library should pick it up itself) 1577 time_t now, 1598 if (now == 0) 1599 now = time(NULL); 1626 if (abs((int)(authtime - now)) > authtimediff) { 1574 heim_ntlm_verify_ntlm2(const void *key, size_t len, const char *username, const char *target, time_t now, const unsigned char serverchallenge[8], const struct ntlm_buf *answer, struct ntlm_buf *infotarget, unsigned char ntlmv2[16]) argument
|
/freebsd-11-stable/usr.bin/finger/ |
H A D | lprint.c | 209 if (now - w->loginat > 86400 * 365 / 2) {
|