Searched refs:valid_before (Results 1 – 9 of 9) sorted by relevance
| /src/crypto/openssh/ |
| H A D | auth-options.c | 330 uint64_t valid_before; in sshauthopt_parse() local 394 if (parse_absolute_time(opt, &valid_before) != 0 || in sshauthopt_parse() 395 valid_before == 0) { in sshauthopt_parse() 401 if (ret->valid_before == 0 || in sshauthopt_parse() 402 valid_before < ret->valid_before) in sshauthopt_parse() 403 ret->valid_before = valid_before; in sshauthopt_parse() 612 if (primary->valid_before != 0) in sshauthopt_merge() 613 ret->valid_before = primary->valid_before; in sshauthopt_merge() 614 if (additional->valid_before != 0 && in sshauthopt_merge() 615 additional->valid_before < ret->valid_before) in sshauthopt_merge() [all …]
|
| H A D | sshsig.c | 636 uint64_t valid_after, valid_before; member 680 if (ret->valid_before != 0) { in sshsigopt_parse() 686 if (parse_absolute_time(opt, &ret->valid_before) != 0 || in sshsigopt_parse() 687 ret->valid_before == 0) { in sshsigopt_parse() 712 if (ret->valid_after != 0 && ret->valid_before != 0 && in sshsigopt_parse() 713 ret->valid_before <= ret->valid_after) { in sshsigopt_parse() 967 if (sigopts->valid_before != 0 && in check_allowed_keys_line() 968 (uint64_t)verify_time > sigopts->valid_before) { in check_allowed_keys_line() 969 format_absolute_time(sigopts->valid_before, in check_allowed_keys_line()
|
| H A D | auth2-pubkeyfile.c | 66 if (opts->valid_before && now > 0 && in auth_authorise_keyopts() 67 opts->valid_before < (uint64_t)now) { in auth_authorise_keyopts() 68 format_absolute_time(opts->valid_before, buf, sizeof(buf)); in auth_authorise_keyopts()
|
| H A D | auth-options.h | 47 uint64_t valid_before; member
|
| H A D | auth.c | 704 opts->valid_before == 0 ? "" : "expires", in auth_log_authopts() 732 if (opts->valid_before != 0) { in auth_log_authopts() 733 format_absolute_time(opts->valid_before, buf, sizeof(buf)); in auth_log_authopts()
|
| H A D | sshkey.c | 1558 to->valid_before = from->valid_before; in sshkey_cert_copy() 1885 (ret = sshbuf_get_u64(b, &key->cert->valid_before)) != 0 || in cert_parse() 2352 (ret = sshbuf_put_u64(cert, k->cert->valid_before)) != 0 || in sshkey_certify_custom() 2436 if (verify_time >= k->cert->valid_before) { in sshkey_cert_check_authority() 2513 cert->valid_before == 0xffffffffffffffffULL) in sshkey_format_cert_validity() 2518 if (cert->valid_before != 0xffffffffffffffffULL) in sshkey_format_cert_validity() 2519 format_absolute_time(cert->valid_before, to, sizeof(to)); in sshkey_format_cert_validity() 2523 else if (cert->valid_before == 0xffffffffffffffffULL) in sshkey_format_cert_validity()
|
| H A D | sshkey.h | 121 u_int64_t valid_after, valid_before; member
|
| H A D | ssh-keygen.c | 1895 public->cert->valid_before = cert_valid_to; in do_ca_sign()
|
| /src/crypto/openssh/regress/unittests/sshkey/ |
| H A D | test_sshkey.c | 440 k1->cert->valid_before = (u_int64_t)-1; in sshkey_tests()
|