Searched refs:valid_end (Results 1 – 11 of 11) sorted by relevance
| /src/crypto/heimdal/lib/hdb/ |
| H A D | hdb-ldap.c | 517 if (orig.entry.valid_end == NULL in LDAP_entry2mods() 527 if (ent->entry.valid_end) { in LDAP_entry2mods() 528 if (orig.entry.valid_end == NULL || (*(ent->entry.valid_end) != *(orig.entry.valid_end))) { in LDAP_entry2mods() 532 ent->entry.valid_end); in LDAP_entry2mods() 539 *(ent->entry.valid_end)); in LDAP_entry2mods() 1200 ent->entry.valid_end = malloc(sizeof(*ent->entry.valid_end)); in LDAP_message2entry() 1201 if (ent->entry.valid_end == NULL) { in LDAP_message2entry() 1207 ent->entry.valid_end); in LDAP_message2entry() 1210 free(ent->entry.valid_end); in LDAP_message2entry() 1211 ent->entry.valid_end = NULL; in LDAP_message2entry() [all …]
|
| H A D | print.c | 255 if(ent->valid_end) in entry2string_int() 256 append_string(context, sp, "%s ", time2str(*ent->valid_end)); in entry2string_int() 430 if (ent->valid_end) in entry2mit_string_int() 431 exp = *ent->valid_end; in entry2mit_string_int()
|
| H A D | hdb-mitdb.c | 267 entry->valid_end = malloc(sizeof(*entry->valid_end)); in _hdb_mdb_value2entry() 268 *entry->valid_end = u32; in _hdb_mdb_value2entry()
|
| /src/crypto/heimdal/kadmin/ |
| H A D | load.c | 46 char *valid_end; member 427 e.valid_end = p; in doit() 483 if (parse_time_string_alloc (&ent.entry.valid_end, e.valid_end) == -1) { in doit() 485 filename, line, e.valid_end); in doit()
|
| /src/crypto/heimdal/lib/kadm5/ |
| H A D | log.c | 592 if (log_ent.entry.valid_end == NULL) { in kadm5_log_replay_modify() 593 ent.entry.valid_end = NULL; in kadm5_log_replay_modify() 595 if (ent.entry.valid_end == NULL) { in kadm5_log_replay_modify() 596 ent.entry.valid_end = malloc(sizeof(*ent.entry.valid_end)); in kadm5_log_replay_modify() 597 if (ent.entry.valid_end == NULL) { in kadm5_log_replay_modify() 603 *ent.entry.valid_end = *log_ent.entry.valid_end; in kadm5_log_replay_modify()
|
| H A D | ent_setup.c | 145 set_value(ent->entry.valid_end, princ->princ_expire_time); in _kadm5_setup_entry() 147 set_null(ent->entry.valid_end); in _kadm5_setup_entry()
|
| H A D | get_s.c | 93 if(mask & KADM5_PRINC_EXPIRE_TIME && ent.entry.valid_end) in kadm5_s_get_principal() 94 out->princ_expire_time = *ent.entry.valid_end; in kadm5_s_get_principal()
|
| H A D | iprop-log.c | 196 if(ent.valid_end == NULL) { in print_entry() 200 localtime(ent.valid_end)); in print_entry()
|
| /src/crypto/heimdal/kdc/ |
| H A D | kerberos5.c | 781 if (client->valid_end && *client->valid_end < kdc_time) { in kdc_check_flags() 783 krb5_format_time(context, *client->valid_end, in kdc_check_flags() 841 if (server->valid_end && *server->valid_end < kdc_time) { in kdc_check_flags() 843 krb5_format_time(context, *server->valid_end, in kdc_check_flags() 1630 if (client->entry.valid_end) { in _kdc_as_rep() 1632 ek.last_req.val[ek.last_req.len].lr_value = *client->entry.valid_end; in _kdc_as_rep() 1641 if (client->entry.valid_end || client->entry.pw_end) { in _kdc_as_rep() 1643 if (client->entry.valid_end) { in _kdc_as_rep() 1645 *ek.key_expiration = min(*client->entry.valid_end, in _kdc_as_rep() 1648 *ek.key_expiration = *client->entry.valid_end; in _kdc_as_rep()
|
| /src/crypto/heimdal/ |
| H A D | ChangeLog.2000 | 1070 * kdc/hpropd.c (dump_krb4): get expiration date from `valid_end' 1073 * kdc/kadb.h (ka_entry): fix name pw_end -> valid_end. add some 1076 * kdc/hprop.c (v4_prop): set the `valid_end' from the v4 1078 (ka_convert): set `valid_end' from ka expiration data and `pw_expire'
|
| H A D | ChangeLog.1998 | 2212 Set key.expiration to min(valid_end, pw_end)
|