Searched refs:valid_before (Results 1 – 9 of 9) sorted by relevance
| /openbsd-src/usr.bin/ssh/ |
| H A D | auth-options.c | 325 uint64_t valid_before; in sshauthopt_parse() local 389 if (parse_absolute_time(opt, &valid_before) != 0 || in sshauthopt_parse() 390 valid_before == 0) { in sshauthopt_parse() 396 if (ret->valid_before == 0 || in sshauthopt_parse() 397 valid_before < ret->valid_before) in sshauthopt_parse() 398 ret->valid_before = valid_before; in sshauthopt_parse() 607 if (primary->valid_before != 0) in sshauthopt_merge() 608 ret->valid_before = primary->valid_before; in sshauthopt_merge() 609 if (additional->valid_before != 0 && in sshauthopt_merge() 610 additional->valid_before < ret->valid_before) in sshauthopt_merge() [all …]
|
| H A D | sshsig.c | 634 uint64_t valid_after, valid_before; in sshsigopt_parse() 678 if (ret->valid_before != 0) { in sshsigopt_parse() 684 if (parse_absolute_time(opt, &ret->valid_before) != 0 || in sshsigopt_parse() 685 ret->valid_before == 0) { in sshsigopt_parse() 710 if (ret->valid_after != 0 && ret->valid_before != 0 && in sshsigopt_parse() 711 ret->valid_before <= ret->valid_after) { in sshsigopt_parse() 964 if (sigopts->valid_before != 0 && in check_allowed_keys_line() 965 (uint64_t)verify_time > sigopts->valid_before) { in check_allowed_keys_line() 966 format_absolute_time(sigopts->valid_before, in check_allowed_keys_line() 629 uint64_t valid_after, valid_before; global() member
|
| H A D | auth2-pubkeyfile.c | 65 if (opts->valid_before && now > 0 && in auth_authorise_keyopts() 66 opts->valid_before < (uint64_t)now) { in auth_authorise_keyopts() 67 format_absolute_time(opts->valid_before, buf, sizeof(buf)); in auth_authorise_keyopts()
|
| H A D | auth-options.h | 47 uint64_t valid_before; member
|
| H A D | auth.c | 604 opts->valid_before == 0 ? "" : "expires", in auth_log_authopts() 632 if (opts->valid_before != 0) { in auth_log_authopts() 633 format_absolute_time(opts->valid_before, buf, sizeof(buf)); in auth_log_authopts()
|
| H A D | sshkey.c | 1518 to->valid_before = from->valid_before; in sshkey_shield_private() 1845 (ret = sshbuf_get_u64(b, &key->cert->valid_before)) != 0 || in cert_parse() 2312 (ret = sshbuf_put_u64(cert, k->cert->valid_before)) != 0 || in sshkey_cert_check_authority() 2396 if (verify_time >= k->cert->valid_before) { in sshkey_serialize_private_sk() 2473 cert->valid_before == 0xffffffffffffffffULL) in sshkey_private_deserialize_sk() 2478 if (cert->valid_before != 0xffffffffffffffffULL) in sshkey_private_deserialize() 2479 format_absolute_time(cert->valid_before, to, sizeof(to)); in sshkey_private_deserialize() 2483 else if (cert->valid_before == 0xffffffffffffffffULL) in sshkey_private_deserialize()
|
| H A D | sshkey.h | 113 u_int64_t valid_after, valid_before; 111 u_int64_t valid_after, valid_before; global() member
|
| H A D | ssh-keygen.c | 1872 public->cert->valid_before = cert_valid_to; in do_ca_sign()
|
| /openbsd-src/regress/usr.bin/ssh/unittests/sshkey/ |
| H A D | test_sshkey.c | 400 k1->cert->valid_before = (u_int64_t)-1; in sshkey_tests()
|