| /src/external/bsd/wpa/dist/src/common/ |
| ptksa_cache.h | 23 os_time_t expiration; member in struct:ptksa_cache_entry
|
| ptksa_cache.c | 50 if (e->expiration > now.sec) 82 sec = e->expiration - now.sec; 178 "Index / ADDR / Cipher / expiration (secs) / TK / KDK\n"); 192 e->expiration - now.sec); 267 * @life_time_expiry_cb: Callback for alternative expiration handling 316 entry->expiration = now.sec + life_time; 319 if (tmp->expiration > entry->expiration) { 328 * If the expiration is later then all other or the list is empty
|
| /src/external/mpl/bind/dist/bin/tests/system/nsec/ |
| tests_excessive_rrsigs.py | 33 expiration=rdata.expiration,
|
| /src/external/bsd/wpa/dist/src/ap/ |
| pmksa_cache_auth.c | 118 while (pmksa->pmksa && pmksa->pmksa->expiration <= now.sec) { 137 sec = pmksa->pmksa->expiration - now.sec; 231 /* Add the new entry; order by expiration time */ 235 if (pos->expiration > entry->expiration) 350 entry->expiration = now.sec; 352 entry->expiration += session_timeout; 354 entry->expiration += dot11RSNAConfigPMKLifetime; 413 entry->expiration = old_entry->expiration; [all...] |
| pmksa_cache_auth.h | 24 os_time_t expiration; member in struct:rsn_pmksa_cache_entry
|
| ctrl_iface_ap.c | 1176 int akmp = 0, expiration = 0; local 1180 * <STA addr> <PMKID> <PMK> <expiration in seconds> <akmp> 1209 if (sscanf(pos, "%d %d", &expiration, &akmp) != 2) 1213 pmkid, expiration, akmp, NULL); 1233 int expiration; local 1237 * <BSSID> <PMKID> <PMK> <expiration in seconds> 1264 if (sscanf(pos, "%d", &expiration) != 1) 1268 WPA_KEY_MGMT_SAE, pmkid, expiration);
|
| /src/external/mpl/bind/dist/bin/tests/system/tkey/ |
| tests_cve_2026_3119.py | 39 expiration=now + 86400,
|
| /src/external/mpl/bind/dist/bin/tests/system/sig0/ |
| tests_sig0.py | 80 expiration = now + 3600 86 "!HBBIIIH", 0, 8, 0, 0, expiration, inception, key_tag
|
| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| pmksa_cache.h | 22 os_time_t expiration; member in struct:rsn_pmksa_cache_entry 53 * every 10 minutes during the periodic expiration check of the current
|
| pmksa_cache.c | 97 while (entry && entry->expiration <= now.sec) { 106 "RSN: postpone PMKSA cache entry expiration for SAE with " 168 sec = pmksa->pmksa->expiration - now.sec; 175 * from SAE to expire every second. Use the expiration 181 sec = entry->expiration - now.sec; 273 entry->expiration = now.sec + pmk_lifetime; 364 /* Add the new entry; order by expiration time */ 368 if (pos->expiration > entry->expiration) 506 os_time_t old_expiration = old_entry->expiration; [all...] |
| /src/external/gpl3/gcc.old/dist/contrib/testsuite-management/ |
| validate_failures.py | 157 # Return a datetime.date object with the expiration date for this 158 # test result. Return None, if no expiration has been set. 160 expiration = re.search(r'expire=(\d\d\d\d)(\d\d)(\d\d)', self.attrs) 161 if not expiration: 164 return datetime.date(int(expiration.group(1)), 165 int(expiration.group(2)), 166 int(expiration.group(3))) 170 # Return True if the expiration date of this result has passed.
|
| /src/crypto/external/bsd/heimdal/dist/kadmin/ |
| util.c | 476 if(edit_timet ("Principal expiration time", &ent->princ_expire_time, mask, 480 if(edit_timet ("Password expiration time", &ent->pw_expiration, mask, 507 const char *expiration, 527 if (expiration) { 528 if (parse_timet (expiration, &ent->princ_expire_time, 530 krb5_warnx (contextp, "unable to parse `%s'", expiration);
|
| ank.c | 78 const char *expiration, 100 expiration, pw_expiration, attributes, policy);
|
| /src/external/bsd/ntp/dist/scripts/update-leap/ |
| update-leap-opts.def | 71 name = expiration; 76 Specify how long before expiration the file is to be refreshed
|
| update-leap.sh | 30 # How long before expiration to get updated file 68 -e Specify how long before expiration the file is to be refreshed 296 # Check the expiration date, converting NTP epoch to Unix epoch used by date
|
| /src/external/mpl/bind/dist/bin/tests/system/dnssec_malformed_dnskey/ |
| tests_malformed_dnskey.py | 58 expiration=rr.expiration,
|
| /src/external/mpl/bind/dist/bin/dnssec/ |
| dnssec-ksr.c | 331 isc_stdtime_t active, isc_stdtime_t *expiration) { 426 *expiration = inact; 514 *expiration = inactive; 516 *expiration = 0; 646 sign_rrset(ksr_ctx_t *ksr, isc_stdtime_t inception, isc_stdtime_t expiration, 651 isc_stdtime_t next_bundle = expiration; 718 &expiration, mctx, &buf, &rdata); 905 isc_stdtime_t expiration = inception + ksr->sigvalidity; local 953 next_time = sign_rrset(ksr, inception, expiration, &rrset, 963 (void)sign_rrset(ksr, inception, expiration, &cdnskey [all...] |
| /src/external/gpl3/gcc/dist/contrib/testsuite-management/ |
| validate_failures.py | 196 # Return a datetime.date object with the expiration date for this 197 # test result. Return None, if no expiration has been set. 199 expiration = re.search(r'expire=(\d\d\d\d)(\d\d)(\d\d)', self.attrs) 200 if not expiration: 203 return datetime.date(int(expiration.group(1)), 204 int(expiration.group(2)), 205 int(expiration.group(3))) 209 # Return True if the expiration date of this result has passed. 702 # Set "today" date to compare expiration entries against. 703 # Setting expiration date into the future allows re-detection of flak [all...] |
| /src/external/mpl/bind/dist/tests/dns/ |
| skr_test.c | 51 isc_stdtime_t expiration; member in struct:__anon24221 141 sign_rrset(FILE *fp, isc_stdtime_t inception, isc_stdtime_t expiration, 149 ret = dns_dnssec_sign(dname, rrset, ksk->key, &clockskew, &expiration, 307 test_bundles[bnum].expiration = (btime + LIFETIME); 344 assert_int_equal(sig.timeexpire, tb->expiration);
|
| /src/crypto/external/bsd/heimdal/dist/kuser/ |
| klist.c | 362 time_t *expiration) 371 if (expiration) 372 *expiration = time(NULL) + t;
|
| /src/external/mpl/bind/dist/bin/tests/system/nsec3/ans7/ |
| ans.py | 145 expiration, 153 sig_rdata += struct.pack("!II", expiration, inception) 232 expiration=RRSIG_EXPIRATION,
|
| /src/external/apache2/llvm/dist/llvm/include/llvm-c/ |
| lto.h | 862 * - The pruning expiration time indicates to the garbage collector how old an 905 * Sets the expiration (in seconds) for an entry in the cache. An unspecified 911 unsigned expiration);
|
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| fast.c | 119 if (r->fast.expiration < kdc_time) { 142 r->fast.expiration = kdc_time + FAST_EXPIRATION_TIME;
|
| /src/external/apache2/llvm/dist/llvm/tools/lto/ |
| lto.cpp | 623 unsigned expiration) { 624 return unwrap(cg)->setCacheEntryExpiration(expiration);
|
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| revoke.c | 1284 * @param expiration return the time the OCSP will expire and need to 1298 time_t *expiration) 1308 *expiration = 0; 1350 *expiration = *basic.tbsResponseData.responses.val[i].nextUpdate; 1352 *expiration = now;
|