Home
last modified time | relevance | path

Searched refs:expiration (Results 1 - 25 of 35) sorted by relevance

12

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H A Dpmksa_cache_auth.c115 while (pmksa->pmksa && pmksa->pmksa->expiration <= now.sec) { in pmksa_cache_expire()
134 sec = pmksa->pmksa->expiration - now.sec; in pmksa_cache_set_expiration()
228 /* Add the new entry; order by expiration time */ in pmksa_cache_link_entry()
232 if (pos->expiration > entry->expiration) in pmksa_cache_link_entry()
343 entry->expiration = now.sec; in pmksa_cache_auth_create_entry()
345 entry->expiration += session_timeout; in pmksa_cache_auth_create_entry()
347 entry->expiration += dot11RSNAConfigPMKLifetime; in pmksa_cache_auth_create_entry()
406 entry->expiration = old_entry->expiration; in pmksa_cache_add_okc()
[all...]
H A Dpmksa_cache_auth.h22 os_time_t expiration; member
H A Dctrl_iface_ap.c958 int akmp = 0, expiration = 0; in hostapd_ctrl_iface_pmksa_add() local
962 * <STA addr> <PMKID> <PMK> <expiration in seconds> <akmp> in hostapd_ctrl_iface_pmksa_add()
991 if (sscanf(pos, "%d %d", &expiration, &akmp) != 2) in hostapd_ctrl_iface_pmksa_add()
995 pmkid, expiration, akmp); in hostapd_ctrl_iface_pmksa_add()
1015 int expiration; in hostapd_ctrl_iface_pmksa_create_entry() local
1019 * <BSSID> <PMKID> <PMK> <expiration in seconds> in hostapd_ctrl_iface_pmksa_create_entry()
1046 if (sscanf(pos, "%d", &expiration) != 1) in hostapd_ctrl_iface_pmksa_create_entry()
1050 WPA_KEY_MGMT_SAE, pmkid, expiration); in hostapd_ctrl_iface_pmksa_create_entry()
H A Dwpa_auth_ft.c1177 os_time_t expiration; /* 0 for no expiration */ member
1182 os_time_t session_timeout; /* 0 for no expiration */
1199 os_time_t session_timeout; /* 0 for no expiration */
1241 expires_in = r0->expiration - now.sec; in wpa_ft_expire_pmk_r0()
1244 * a) r0->expiration is set and hit in wpa_ft_expire_pmk_r0()
1248 if ((!r0->expiration || expires_in > 0) && in wpa_ft_expire_pmk_r0()
1254 if (r0->expiration && expires_in > 0) in wpa_ft_expire_pmk_r0()
1348 r0->expiration = now.sec + expires_in; in wpa_ft_store_pmk_r0()
3016 if (r0->expiration) in wpa_ft_local_derive_pmk_r1()
[all...]
H A Ddpp_hostapd.c1616 int expiration; in hostapd_dpp_rx_peer_disc_req() local
1703 expiration = expire - now.sec; in hostapd_dpp_rx_peer_disc_req()
1705 expiration = 0; in hostapd_dpp_rx_peer_disc_req()
1708 intro.pmkid, expiration, in hostapd_dpp_rx_peer_disc_req()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/
H A Dpmksa_cache.c66 while (entry && entry->expiration <= now.sec) { in pmksa_cache_expire()
75 "RSN: postpone PMKSA cache entry expiration for SAE with " in pmksa_cache_expire()
116 sec = pmksa->pmksa->expiration - now.sec; in pmksa_cache_set_expiration()
122 * from SAE to expire every second. Use the expiration in pmksa_cache_set_expiration()
128 sec = entry->expiration - now.sec; in pmksa_cache_set_expiration()
201 entry->expiration = now.sec + pmksa->sm->dot11RSNAConfigPMKLifetime; in pmksa_cache_add()
290 /* Add the new entry; order by expiration time */ in pmksa_cache_add_entry()
294 if (pos->expiration > entry->expiration) in pmksa_cache_add_entry()
422 os_time_t old_expiration = old_entry->expiration; in pmksa_cache_clone_entry()
[all...]
H A Dpmksa_cache.h20 os_time_t expiration; member
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dpmksa_cache_auth.c115 while (pmksa->pmksa && pmksa->pmksa->expiration <= now.sec) { in pmksa_cache_expire()
134 sec = pmksa->pmksa->expiration - now.sec; in pmksa_cache_set_expiration()
228 /* Add the new entry; order by expiration time */ in pmksa_cache_link_entry()
232 if (pos->expiration > entry->expiration) in pmksa_cache_link_entry()
343 entry->expiration = now.sec; in pmksa_cache_auth_create_entry()
345 entry->expiration += session_timeout; in pmksa_cache_auth_create_entry()
347 entry->expiration += dot11RSNAConfigPMKLifetime; in pmksa_cache_auth_create_entry()
406 entry->expiration = old_entry->expiration; in pmksa_cache_add_okc()
[all...]
H A Dpmksa_cache_auth.h22 os_time_t expiration; member
H A Dctrl_iface_ap.c901 int akmp = 0, expiration = 0; in hostapd_ctrl_iface_pmksa_add() local
905 * <STA addr> <PMKID> <PMK> <expiration in seconds> <akmp> in hostapd_ctrl_iface_pmksa_add()
934 if (sscanf(pos, "%d %d", &expiration, &akmp) != 2) in hostapd_ctrl_iface_pmksa_add()
938 pmkid, expiration, akmp); in hostapd_ctrl_iface_pmksa_add()
958 int expiration; in hostapd_ctrl_iface_pmksa_create_entry() local
962 * <BSSID> <PMKID> <PMK> <expiration in seconds> in hostapd_ctrl_iface_pmksa_create_entry()
989 if (sscanf(pos, "%d", &expiration) != 1) in hostapd_ctrl_iface_pmksa_create_entry()
992 return wpa_auth_pmksa_create_entry(aa, spa, pmk, pmkid, expiration); in hostapd_ctrl_iface_pmksa_create_entry()
H A Dwpa_auth_ft.c1175 os_time_t expiration; /* 0 for no expiration */ member
1180 os_time_t session_timeout; /* 0 for no expiration */
1197 os_time_t session_timeout; /* 0 for no expiration */
1239 expires_in = r0->expiration - now.sec; in wpa_ft_expire_pmk_r0()
1242 * a) r0->expiration is set and hit in wpa_ft_expire_pmk_r0()
1246 if ((!r0->expiration || expires_in > 0) && in wpa_ft_expire_pmk_r0()
1252 if (r0->expiration && expires_in > 0) in wpa_ft_expire_pmk_r0()
1346 r0->expiration = now.sec + expires_in; in wpa_ft_store_pmk_r0()
2825 if (r0->expiration) in wpa_ft_local_derive_pmk_r1()
[all...]
H A Ddpp_hostapd.c1065 int expiration; in hostapd_dpp_rx_peer_disc_req() local
1130 expiration = expire - now.sec; in hostapd_dpp_rx_peer_disc_req()
1132 expiration = 0; in hostapd_dpp_rx_peer_disc_req()
1135 intro.pmkid, expiration, in hostapd_dpp_rx_peer_disc_req()
H A Dwpa_auth.h388 const u8 *pmkid, int expiration);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Dptksa_cache.c48 if (e->expiration > now.sec) in ptksa_cache_expire()
77 sec = e->expiration - now.sec; in ptksa_cache_set_expiration()
173 "Index / ADDR / Cipher / expiration (secs) / TK / KDK\n"); in ptksa_cache_list()
187 e->expiration - now.sec); in ptksa_cache_list()
296 entry->expiration = now.sec + life_time; in ptksa_cache_add()
299 if (tmp->expiration > entry->expiration) { in ptksa_cache_add()
306 * If the expiration is later then all other or the list is empty in ptksa_cache_add()
H A Dptksa_cache.h23 os_time_t expiration; member
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/
H A Dpmksa_cache.c62 while (pmksa->pmksa && pmksa->pmksa->expiration <= now.sec) { in pmksa_cache_expire()
93 sec = pmksa->pmksa->expiration - now.sec; in pmksa_cache_set_expiration()
159 entry->expiration = now.sec + pmksa->sm->dot11RSNAConfigPMKLifetime; in pmksa_cache_add()
247 /* Add the new entry; order by expiration time */ in pmksa_cache_add_entry()
251 if (pos->expiration > entry->expiration) in pmksa_cache_add_entry()
373 os_time_t old_expiration = old_entry->expiration; in pmksa_cache_clone_entry()
384 /* TODO: reorder entries based on expiration time? */ in pmksa_cache_clone_entry()
385 new_entry->expiration = old_expiration; in pmksa_cache_clone_entry()
555 "Index / AA / PMKID / expiration (i in pmksa_cache_list()
[all...]
H A Dpmksa_cache.h20 os_time_t expiration; member
/third_party/icu/icu4j/main/tests/core/src/com/ibm/icu/dev/test/message2/
H A DMessageFormat2Test.java51 Date expiration = new Date(2022 - 1900, java.util.Calendar.OCTOBER, 27); in testDateFormat()
57 mf2.formatToString(Args.of("exp", expiration))); in testDateFormat()
64 mf2.formatToString(Args.of("exp", expiration))); in testDateFormat()
70 mf2.formatToString(Args.of("exp", expiration))); in testDateFormat()
76 mf2.formatToString(Args.of("exp", expiration))); in testDateFormat()
82 mf2.formatToString(Args.of("exp", expiration))); in testDateFormat()
98 mf2.formatToString(Args.of("exp", expiration))); in testDateFormat()
/third_party/rust/crates/nix/src/sys/
H A Dtimer.rs3 //! Timer is a POSIX API to create timers and get expiration notifications
41 //! let expiration = Expiration::Interval(Duration::from_millis(250).into());
43 //! timer.set(expiration, flags).expect("could not set timer");
130 expiration: Expiration, in set()
133 let timerspec: TimerSpec = expiration.into(); in set()
168 /// if the signal is not handled before the next expiration the timer has
H A Dtimerfd.rs3 //! Timer FD is a Linux-only API to create timers and get expiration
142 expiration: Expiration, in set()
145 let timerspec: TimerSpec = expiration.into(); in set()
H A Dtime.rs58 fn from(expiration: Expiration) -> TimerSpec { in from()
59 match expiration { in from()
78 /// An enumeration allowing the definition of the expiration time of an alarm,
/third_party/rust/crates/nix/test/
H A Dtest_timer.rs53 let expiration = Expiration::Interval(TIMER_PERIOD.into()); in alarm_fires()
55 timer.set(expiration, flags).expect("could not set timer"); in alarm_fires()
61 // Determine that there's still an expiration tracked by the in alarm_fires()
64 // not fired yet we'll get our original `expiration`, else the one that in alarm_fires()
65 // represents a delay to the next expiration. We're only interested in the in alarm_fires()
72 _ => panic!("timer lost its expiration"), in alarm_fires()
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/include/llvm-c/
H A Dlto.h831 * - The pruning expiration time indicates to the garbage collector how old an
874 * Sets the expiration (in seconds) for an entry in the cache. An unspecified
880 unsigned expiration);
/third_party/skia/infra/bots/gen_tasks_logic/
H A Dtask_builder.go78 // expiration sets the expiration of the task.
79 func (b *taskBuilder) expiration(e time.Duration) {
H A Dgen_tasks_logic.go1560 b.expiration(20 * time.Hour)
1565 b.expiration(48 * time.Hour)
1826 b.expiration(20 * time.Hour)
1831 b.expiration(48 * time.Hour)

Completed in 47 milliseconds

12