Searched refs:valid_end (Results 1 – 11 of 11) sorted by relevance
/netbsd-src/crypto/external/bsd/heimdal/dist/lib/hdb/ |
H A D | hdb-ldap.c | 551 if (orig.entry.valid_end == NULL in LDAP_entry2mods() 561 if (ent->entry.valid_end) { in LDAP_entry2mods() 562 if (orig.entry.valid_end == NULL || (*(ent->entry.valid_end) != *(orig.entry.valid_end))) { in LDAP_entry2mods() 566 ent->entry.valid_end); in LDAP_entry2mods() 573 *(ent->entry.valid_end)); in LDAP_entry2mods() 1258 ent->entry.valid_end = malloc(sizeof(*ent->entry.valid_end)); in LDAP_message2entry() 1259 if (ent->entry.valid_end == NULL) { in LDAP_message2entry() 1265 ent->entry.valid_end); in LDAP_message2entry() 1268 free(ent->entry.valid_end); in LDAP_message2entry() 1269 ent->entry.valid_end = NULL; in LDAP_message2entry() [all …]
|
H A D | print.c | 266 if(ent->valid_end) in entry2string_int() 267 append_string(context, sp, "%s ", time2str(*ent->valid_end)); in entry2string_int() 440 if (ent->valid_end) in entry2mit_string_int() 441 exp = *ent->valid_end; in entry2mit_string_int()
|
H A D | hdb-mitdb.c | 473 entry->valid_end = malloc(sizeof(*entry->valid_end)); in _hdb_mdb_value2entry() 474 *entry->valid_end = u32; in _hdb_mdb_value2entry()
|
/netbsd-src/crypto/external/bsd/heimdal/dist/kadmin/ |
H A D | load.c | 50 char *valid_end; member 489 e.valid_end = p; in doit() 550 if (parse_time_string_alloc (&ent.entry.valid_end, e.valid_end) == -1) { in doit() 552 filename, lineno, e.valid_end); in doit()
|
/netbsd-src/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
H A D | ent_setup.c | 148 set_value(ent->entry.valid_end, princ->princ_expire_time); in _kadm5_setup_entry() 150 set_null(ent->entry.valid_end); in _kadm5_setup_entry()
|
H A D | log.c | 1413 if (log_ent.entry.valid_end == NULL) { in kadm5_log_replay_modify() 1414 ent.entry.valid_end = NULL; in kadm5_log_replay_modify() 1416 if (ent.entry.valid_end == NULL) { in kadm5_log_replay_modify() 1417 ent.entry.valid_end = malloc(sizeof(*ent.entry.valid_end)); in kadm5_log_replay_modify() 1418 if (ent.entry.valid_end == NULL) { in kadm5_log_replay_modify() 1424 *ent.entry.valid_end = *log_ent.entry.valid_end; in kadm5_log_replay_modify()
|
H A D | get_s.c | 163 if(mask & KADM5_PRINC_EXPIRE_TIME && ent.entry.valid_end) in kadm5_s_get_principal() 164 out->princ_expire_time = *ent.entry.valid_end; in kadm5_s_get_principal()
|
H A D | iprop-log.c | 189 if(ent.valid_end == NULL) { in print_entry() 193 localtime(ent.valid_end)); in print_entry()
|
/netbsd-src/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | kerberos5.c | 1376 if (client->valid_end && *client->valid_end < kdc_time) { in kdc_check_flags() 1378 krb5_format_time(context, *client->valid_end, in kdc_check_flags() 1443 if (server->valid_end && *server->valid_end < kdc_time) { in kdc_check_flags() 1445 krb5_format_time(context, *server->valid_end, in kdc_check_flags() 2138 if (r->client->entry.valid_end) { in _kdc_as_rep() 2140 r->ek.last_req.val[r->ek.last_req.len].lr_value = *r->client->entry.valid_end; in _kdc_as_rep() 2149 if (r->client->entry.valid_end || r->client->entry.pw_end) { in _kdc_as_rep() 2151 if (r->client->entry.valid_end) { in _kdc_as_rep() 2153 *r->ek.key_expiration = min(*r->client->entry.valid_end, in _kdc_as_rep() 2156 *r->ek.key_expiration = *r->client->entry.valid_end; in _kdc_as_rep()
|
/netbsd-src/crypto/external/bsd/heimdal/dist/ |
H A D | ChangeLog.2000 | 1070 * kdc/hpropd.c (dump_krb4): get expiration date from `valid_end' 1073 * kdc/kadb.h (ka_entry): fix name pw_end -> valid_end. add some 1076 * kdc/hprop.c (v4_prop): set the `valid_end' from the v4 1078 (ka_convert): set `valid_end' from ka expiration data and `pw_expire'
|
H A D | ChangeLog.1998 | 2212 Set key.expiration to min(valid_end, pw_end)
|