HomeSort by: relevance | last modified time | path
    Searched refs:expiration (Results 1 - 25 of 37) sorted by relevancy

1 2

  /src/external/bsd/wpa/dist/src/common/
ptksa_cache.h 23 os_time_t expiration; member in struct:ptksa_cache_entry
ptksa_cache.c 50 if (e->expiration > now.sec)
82 sec = e->expiration - now.sec;
178 "Index / ADDR / Cipher / expiration (secs) / TK / KDK\n");
192 e->expiration - now.sec);
267 * @life_time_expiry_cb: Callback for alternative expiration handling
316 entry->expiration = now.sec + life_time;
319 if (tmp->expiration > entry->expiration) {
328 * If the expiration is later then all other or the list is empty
  /src/external/mpl/bind/dist/bin/tests/system/nsec/
tests_excessive_rrsigs.py 33 expiration=rdata.expiration,
  /src/external/bsd/wpa/dist/src/ap/
pmksa_cache_auth.c 118 while (pmksa->pmksa && pmksa->pmksa->expiration <= now.sec) {
137 sec = pmksa->pmksa->expiration - now.sec;
231 /* Add the new entry; order by expiration time */
235 if (pos->expiration > entry->expiration)
350 entry->expiration = now.sec;
352 entry->expiration += session_timeout;
354 entry->expiration += dot11RSNAConfigPMKLifetime;
413 entry->expiration = old_entry->expiration;
    [all...]
pmksa_cache_auth.h 24 os_time_t expiration; member in struct:rsn_pmksa_cache_entry
ctrl_iface_ap.c 1176 int akmp = 0, expiration = 0; local
1180 * <STA addr> <PMKID> <PMK> <expiration in seconds> <akmp>
1209 if (sscanf(pos, "%d %d", &expiration, &akmp) != 2)
1213 pmkid, expiration, akmp, NULL);
1233 int expiration; local
1237 * <BSSID> <PMKID> <PMK> <expiration in seconds>
1264 if (sscanf(pos, "%d", &expiration) != 1)
1268 WPA_KEY_MGMT_SAE, pmkid, expiration);
  /src/external/mpl/bind/dist/bin/tests/system/tkey/
tests_cve_2026_3119.py 39 expiration=now + 86400,
  /src/external/mpl/bind/dist/bin/tests/system/sig0/
tests_sig0.py 80 expiration = now + 3600
86 "!HBBIIIH", 0, 8, 0, 0, expiration, inception, key_tag
  /src/external/bsd/wpa/dist/src/rsn_supp/
pmksa_cache.h 22 os_time_t expiration; member in struct:rsn_pmksa_cache_entry
53 * every 10 minutes during the periodic expiration check of the current
pmksa_cache.c 97 while (entry && entry->expiration <= now.sec) {
106 "RSN: postpone PMKSA cache entry expiration for SAE with "
168 sec = pmksa->pmksa->expiration - now.sec;
175 * from SAE to expire every second. Use the expiration
181 sec = entry->expiration - now.sec;
273 entry->expiration = now.sec + pmk_lifetime;
364 /* Add the new entry; order by expiration time */
368 if (pos->expiration > entry->expiration)
506 os_time_t old_expiration = old_entry->expiration;
    [all...]
  /src/external/gpl3/gcc.old/dist/contrib/testsuite-management/
validate_failures.py 157 # Return a datetime.date object with the expiration date for this
158 # test result. Return None, if no expiration has been set.
160 expiration = re.search(r'expire=(\d\d\d\d)(\d\d)(\d\d)', self.attrs)
161 if not expiration:
164 return datetime.date(int(expiration.group(1)),
165 int(expiration.group(2)),
166 int(expiration.group(3)))
170 # Return True if the expiration date of this result has passed.
  /src/crypto/external/bsd/heimdal/dist/kadmin/
util.c 476 if(edit_timet ("Principal expiration time", &ent->princ_expire_time, mask,
480 if(edit_timet ("Password expiration time", &ent->pw_expiration, mask,
507 const char *expiration,
527 if (expiration) {
528 if (parse_timet (expiration, &ent->princ_expire_time,
530 krb5_warnx (contextp, "unable to parse `%s'", expiration);
ank.c 78 const char *expiration,
100 expiration, pw_expiration, attributes, policy);
  /src/external/bsd/ntp/dist/scripts/update-leap/
update-leap-opts.def 71 name = expiration;
76 Specify how long before expiration the file is to be refreshed
update-leap.sh 30 # How long before expiration to get updated file
68 -e Specify how long before expiration the file is to be refreshed
296 # Check the expiration date, converting NTP epoch to Unix epoch used by date
  /src/external/mpl/bind/dist/bin/tests/system/dnssec_malformed_dnskey/
tests_malformed_dnskey.py 58 expiration=rr.expiration,
  /src/external/mpl/bind/dist/bin/dnssec/
dnssec-ksr.c 331 isc_stdtime_t active, isc_stdtime_t *expiration) {
426 *expiration = inact;
514 *expiration = inactive;
516 *expiration = 0;
646 sign_rrset(ksr_ctx_t *ksr, isc_stdtime_t inception, isc_stdtime_t expiration,
651 isc_stdtime_t next_bundle = expiration;
718 &expiration, mctx, &buf, &rdata);
905 isc_stdtime_t expiration = inception + ksr->sigvalidity; local
953 next_time = sign_rrset(ksr, inception, expiration, &rrset,
963 (void)sign_rrset(ksr, inception, expiration, &cdnskey
    [all...]
  /src/external/gpl3/gcc/dist/contrib/testsuite-management/
validate_failures.py 196 # Return a datetime.date object with the expiration date for this
197 # test result. Return None, if no expiration has been set.
199 expiration = re.search(r'expire=(\d\d\d\d)(\d\d)(\d\d)', self.attrs)
200 if not expiration:
203 return datetime.date(int(expiration.group(1)),
204 int(expiration.group(2)),
205 int(expiration.group(3)))
209 # Return True if the expiration date of this result has passed.
702 # Set "today" date to compare expiration entries against.
703 # Setting expiration date into the future allows re-detection of flak
    [all...]
  /src/external/mpl/bind/dist/tests/dns/
skr_test.c 51 isc_stdtime_t expiration; member in struct:__anon24221
141 sign_rrset(FILE *fp, isc_stdtime_t inception, isc_stdtime_t expiration,
149 ret = dns_dnssec_sign(dname, rrset, ksk->key, &clockskew, &expiration,
307 test_bundles[bnum].expiration = (btime + LIFETIME);
344 assert_int_equal(sig.timeexpire, tb->expiration);
  /src/crypto/external/bsd/heimdal/dist/kuser/
klist.c 362 time_t *expiration)
371 if (expiration)
372 *expiration = time(NULL) + t;
  /src/external/mpl/bind/dist/bin/tests/system/nsec3/ans7/
ans.py 145 expiration,
153 sig_rdata += struct.pack("!II", expiration, inception)
232 expiration=RRSIG_EXPIRATION,
  /src/external/apache2/llvm/dist/llvm/include/llvm-c/
lto.h 862 * - The pruning expiration time indicates to the garbage collector how old an
905 * Sets the expiration (in seconds) for an entry in the cache. An unspecified
911 unsigned expiration);
  /src/crypto/external/bsd/heimdal/dist/kdc/
fast.c 119 if (r->fast.expiration < kdc_time) {
142 r->fast.expiration = kdc_time + FAST_EXPIRATION_TIME;
  /src/external/apache2/llvm/dist/llvm/tools/lto/
lto.cpp 623 unsigned expiration) {
624 return unwrap(cg)->setCacheEntryExpiration(expiration);
  /src/crypto/external/bsd/heimdal/dist/lib/hx509/
revoke.c 1284 * @param expiration return the time the OCSP will expire and need to
1298 time_t *expiration)
1308 *expiration = 0;
1350 *expiration = *basic.tbsResponseData.responses.val[i].nextUpdate;
1352 *expiration = now;

Completed in 29 milliseconds

1 2