Searched refs:pw_expiration (Results 1 - 8 of 8) sorted by relevance

/freebsd-11-stable/crypto/heimdal/kadmin/
H A Dutil.c388 ent->pw_expiration = default_ent->pw_expiration;
415 if(edit_timet ("Password expiration time", &ent->pw_expiration, mask,
439 const char *pw_expiration,
464 if (pw_expiration) {
465 if (parse_timet (pw_expiration, &ent->pw_expiration,
467 krb5_warnx (contextp, "unable to parse `%s'", pw_expiration);
433 set_entry(krb5_context contextp, kadm5_principal_ent_t ent, int *mask, const char *max_ticket_life, const char *max_renewable_life, const char *expiration, const char *pw_expiration, const char *attributes) argument
H A Dank.c76 const char *pw_expiration)
97 expiration, pw_expiration, attributes);
66 add_one_principal(const char *name, int rand_key, int rand_password, int use_defaults, char *password, krb5_key_data *key_data, const char *max_ticket_life, const char *max_renewable_life, const char *attributes, const char *expiration, const char *pw_expiration) argument
H A Dget.c50 { "pw_expiration", KADM5_PW_EXPIRATION, 0, 0, "PW-exp", "Password expires", 0 },
176 time_t2str(princ->pw_expiration, buf, buf_len, !condensed);
451 #define DEFAULT_COLUMNS_SHORT "principal,princ_expire_time,pw_expiration,last_pwd_change,max_life,max_rlife"
452 #define DEFAULT_COLUMNS_LONG "principal,princ_expire_time,pw_expiration,last_pwd_change,max_life,max_rlife,kvno,mkvno,last_success,last_failed,fail_auth_count,mod_time,mod_name,attributes,keytypes,pkinit-acl,aliases"
H A Drpc.c404 CHECK(krb5_store_uint32(sp, ent->pw_expiration));
463 ent->pw_expiration = flag;
/freebsd-11-stable/crypto/heimdal/lib/kadm5/
H A Dent_setup.c151 if (princ->pw_expiration)
152 set_value(ent->entry.pw_end, princ->pw_expiration);
H A Dadmin.h138 krb5_timestamp pw_expiration; member in struct:_kadm5_principal_ent_t
H A Dmarshall.c117 krb5_store_int32(sp, princ->pw_expiration);
199 princ->pw_expiration = tmp;
H A Dget_s.c96 out->pw_expiration = *ent.entry.pw_end;

Completed in 76 milliseconds