/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | pmksa_cache_auth.c | 115 while (pmksa->pmksa && pmksa->pmksa->expiration <= now.sec) { 134 sec = pmksa->pmksa->expiration - now.sec; 228 /* Add the new entry; order by expiration time */ 232 if (pos->expiration > entry->expiration) 343 entry->expiration = now.sec; 345 entry->expiration += session_timeout; 347 entry->expiration += dot11RSNAConfigPMKLifetime; 406 entry->expiration = old_entry->expiration; [all...] |
H A D | pmksa_cache_auth.h | 22 os_time_t expiration; member in struct:rsn_pmksa_cache_entry
|
H A D | ctrl_iface_ap.c | 901 int akmp = 0, expiration = 0; local 905 * <STA addr> <PMKID> <PMK> <expiration in seconds> <akmp> 934 if (sscanf(pos, "%d %d", &expiration, &akmp) != 2) 938 pmkid, expiration, akmp); 958 int expiration; local 962 * <BSSID> <PMKID> <PMK> <expiration in seconds> 989 if (sscanf(pos, "%d", &expiration) != 1) 992 return wpa_auth_pmksa_create_entry(aa, spa, pmk, pmkid, expiration);
|
H A D | dpp_hostapd.c | 1065 int expiration; local 1130 expiration = expire - now.sec; 1132 expiration = 0; 1135 intro.pmkid, expiration,
|
H A D | wpa_auth_ft.c | 1175 os_time_t expiration; /* 0 for no expiration */ member in struct:wpa_ft_pmk_r0_sa 1180 os_time_t session_timeout; /* 0 for no expiration */ 1197 os_time_t session_timeout; /* 0 for no expiration */ 1239 expires_in = r0->expiration - now.sec; 1242 * a) r0->expiration is set and hit 1246 if ((!r0->expiration || expires_in > 0) && 1252 if (r0->expiration && expires_in > 0) 1346 r0->expiration = now.sec + expires_in; 2825 if (r0->expiration) [all...] |
H A D | wpa_auth.h | 388 const u8 *pmkid, int expiration);
|
H A D | wpa_auth.c | 4505 const u8 *pmkid, int expiration) 4516 entry->expiration = now.sec + expiration; 4504 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk, const u8 *pmkid, int expiration) argument
|
/freebsd-11-stable/contrib/wpa/src/rsn_supp/ |
H A D | pmksa_cache.c | 62 while (pmksa->pmksa && pmksa->pmksa->expiration <= now.sec) { 93 sec = pmksa->pmksa->expiration - now.sec; 159 entry->expiration = now.sec + pmksa->sm->dot11RSNAConfigPMKLifetime; 247 /* Add the new entry; order by expiration time */ 251 if (pos->expiration > entry->expiration) 373 os_time_t old_expiration = old_entry->expiration; 384 /* TODO: reorder entries based on expiration time? */ 385 new_entry->expiration = old_expiration; 555 "Index / AA / PMKID / expiration (i [all...] |
H A D | pmksa_cache.h | 20 os_time_t expiration; member in struct:rsn_pmksa_cache_entry
|
/freebsd-11-stable/crypto/heimdal/kadmin/ |
H A D | util.c | 411 if(edit_timet ("Principal expiration time", &ent->princ_expire_time, mask, 415 if(edit_timet ("Password expiration time", &ent->pw_expiration, mask, 438 const char *expiration, 457 if (expiration) { 458 if (parse_timet (expiration, &ent->princ_expire_time, 460 krb5_warnx (contextp, "unable to parse `%s'", expiration); 433 set_entry(krb5_context contextp, kadm5_principal_ent_t ent, int *mask, const char *max_ticket_life, const char *max_renewable_life, const char *expiration, const char *pw_expiration, const char *attributes) argument
|
H A D | ank.c | 75 const char *expiration, 97 expiration, pw_expiration, attributes); 66 add_one_principal(const char *name, int rand_key, int rand_password, int use_defaults, char *password, krb5_key_data *key_data, const char *max_ticket_life, const char *max_renewable_life, const char *attributes, const char *expiration, const char *pw_expiration) argument
|
/freebsd-11-stable/crypto/heimdal/kuser/ |
H A D | klist.c | 335 time_t *expiration) 363 if (expiration) 364 *expiration = creds.times.endtime; 332 check_for_tgt(krb5_context context, krb5_ccache ccache, krb5_principal principal, time_t *expiration) argument
|
/freebsd-11-stable/contrib/ntp/scripts/update-leap/ |
H A D | update-leap.sh | 30 # How long before expiration to get updated file 68 -e Specify how long before expiration the file is to be refreshed 296 # Check the expiration date, converting NTP epoch to Unix epoch used by date
|
H A D | update-leap.in | 57 # How long (in days) before expiration to get updated file 404 -e Specify how long (in days) before expiration the file is to be
|
/freebsd-11-stable/contrib/ldns/ldns/ |
H A D | keys.h | 141 /** The expiration date of signatures made with this key. */ 142 uint32_t expiration; member in struct:ldns_struct_key::__anon1815::__anon1816 381 * Set the key's expiration date (seconds after epoch) 383 * \param[in] e the expiration 505 * return the key's expiration date
|
/freebsd-11-stable/contrib/llvm-project/llvm/include/llvm-c/ |
H A D | lto.h | 831 * - The pruning expiration time indicates to the garbage collector how old an 874 * Sets the expiration (in seconds) for an entry in the cache. An unspecified 880 unsigned expiration);
|
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | revoke.c | 1178 * @param expiration return the time the OCSP will expire and need to 1192 time_t *expiration) 1202 *expiration = 0; 1244 *expiration = *basic.tbsResponseData.responses.val[i].nextUpdate; 1246 *expiration = now; 1187 hx509_ocsp_verify(hx509_context context, time_t now, hx509_cert cert, int flags, const void *data, size_t length, time_t *expiration) argument
|
H A D | hxtool.c | 1146 time_t expiration; local 1150 os->data, os->length, &expiration); 1156 printf("expire: %d\n", (int)expiration);
|
/freebsd-11-stable/contrib/ldns/ |
H A D | dnssec_verify.c | 2141 int32_t inception, expiration; local 2146 expiration = (int32_t)ldns_rdf2native_time_t( 2149 if (expiration - inception < 0) { 2150 /* bad sig, expiration before inception?? Tsssg */ 2157 if (expiration - ((int32_t) now) < 0) { 2158 /* bad sig, expiration date has passed */
|
H A D | keys.c | 1064 k->_extra.dnssec.expiration = e; 1196 return k->_extra.dnssec.expiration;
|
/freebsd-11-stable/cddl/contrib/opensolaris/lib/libzpool/common/ |
H A D | kernel.c | 946 cyclic_reprogram(cyclic_id_t id, hrtime_t expiration) argument
|
/freebsd-11-stable/contrib/wpa/src/wps/ |
H A D | wps_registrar.c | 87 struct os_reltime expiration; member in struct:wps_uuid_pin 809 os_get_reltime(&p->expiration); 810 p->expiration.sec += timeout; 864 os_reltime_before(&pin->expiration, &now)) {
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | ctrl_iface.c | 9682 * <expiration in seconds> <akmp> <opportunistic> 9711 (int) (entry->expiration - now.sec), 9747 int reauth_time = 0, expiration = 0, i; local 9752 * <expiration in seconds> <akmp> <opportunistic> 9798 if (sscanf(pos, "%d %d %d %d", &reauth_time, &expiration, 9817 entry->expiration = now.sec + expiration;
|
H A D | dpp_supplicant.c | 1427 entry->expiration = rnow.sec + seconds;
|