/external/tpm2/ |
D | PolicySigned.c | 38 UINT32 expiration = (in->expiration < 0) in TPM2_PolicySigned() local 39 ? -(in->expiration) : in->expiration; in TPM2_PolicySigned() 50 if(expiration != 0) in TPM2_PolicySigned() 51 authTimeout = expiration * 1000 + session->startTime; in TPM2_PolicySigned() 88 CryptUpdateDigestInt(&hashState, sizeof(UINT32), (BYTE*) &in->expiration); in TPM2_PolicySigned() 120 if( in->expiration < 0 in TPM2_PolicySigned()
|
D | PolicySecret.c | 33 UINT32 expiration = (in->expiration < 0) in TPM2_PolicySecret() local 34 ? -(in->expiration) : in->expiration; in TPM2_PolicySecret() 46 if(expiration != 0) in TPM2_PolicySecret() 47 authTimeout = expiration * 1000 + session->startTime; in TPM2_PolicySecret() 73 if( in->expiration < 0 in TPM2_PolicySecret()
|
D | PolicySecret_fp.h | 18 INT32 expiration; member
|
D | PolicySigned_fp.h | 18 INT32 expiration; member
|
D | Marshal_PolicySecret.c | 59 result = INT32_Unmarshal(&target->expiration, buffer, size); in PolicySecret_In_Unmarshal()
|
D | Marshal_PolicySigned.c | 59 result = INT32_Unmarshal(&target->expiration, buffer, size); in PolicySigned_In_Unmarshal()
|
/external/wpa_supplicant_8/src/ap/ |
D | pmksa_cache_auth.c | 115 while (pmksa->pmksa && pmksa->pmksa->expiration <= now.sec) { in pmksa_cache_expire() 134 sec = pmksa->pmksa->expiration - now.sec; in pmksa_cache_set_expiration() 232 if (pos->expiration > entry->expiration) in pmksa_cache_link_entry() 344 entry->expiration = now.sec; in pmksa_cache_auth_create_entry() 346 entry->expiration += session_timeout; in pmksa_cache_auth_create_entry() 348 entry->expiration += dot11RSNAConfigPMKLifetime; in pmksa_cache_auth_create_entry() 407 entry->expiration = old_entry->expiration; in pmksa_cache_add_okc() 655 (int) (entry->expiration - now.sec), in pmksa_cache_auth_list() 720 (int) (entry->expiration - now.sec)); in pmksa_cache_auth_list_mesh()
|
D | pmksa_cache_auth.h | 22 os_time_t expiration; member
|
D | ctrl_iface_ap.c | 660 int expiration; in hostapd_ctrl_iface_pmksa_create_entry() local 691 if (sscanf(pos, "%d", &expiration) != 1) in hostapd_ctrl_iface_pmksa_create_entry() 694 return wpa_auth_pmksa_create_entry(aa, spa, pmk, pmkid, expiration); in hostapd_ctrl_iface_pmksa_create_entry()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | pmksa_cache.c | 60 while (pmksa->pmksa && pmksa->pmksa->expiration <= now.sec) { in pmksa_cache_expire() 91 sec = pmksa->pmksa->expiration - now.sec; in pmksa_cache_set_expiration() 156 entry->expiration = now.sec + pmksa->sm->dot11RSNAConfigPMKLifetime; in pmksa_cache_add() 244 if (pos->expiration > entry->expiration) in pmksa_cache_add_entry() 370 new_entry->expiration = old_entry->expiration; in pmksa_cache_clone_entry() 518 (int) (entry->expiration - now.sec), in pmksa_cache_list()
|
D | pmksa_cache.h | 20 os_time_t expiration; member
|
/external/skia/infra/bots/recipe_modules/skia_swarming/ |
D | api.py | 129 extra_args=None, expiration=None, hard_timeout=None, io_timeout=None, argument 162 swarming_task.expiration = ( 163 expiration if expiration else DEFAULT_TASK_EXPIRATION)
|
/external/doclava/res/assets/templates/assets/ |
D | doclava-developer-reference.js | 14 var expiration = date.toGMTString(); 18 writeCookie(API_LEVEL_ENABLED_COOKIE, 1, null, expiration); 22 writeCookie(API_LEVEL_ENABLED_COOKIE, 0, null, expiration); 66 var expiration = date.toGMTString(); 67 writeCookie(API_LEVEL_COOKIE, selectedLevel, null, expiration);
|
D | doclava-developer-docs.js | 120 function writeCookie(cookie, val, section, expiration) { argument 123 if (expiration == null) { 126 expiration = date.toGMTString(); 128 …document.cookie = cookie_namespace + section + cookie + "=" + val + "; expires=" + expiration+"; p…
|
/external/autotest/site_utils/ |
D | job_directories.py | 37 expiration = job_time + datetime.timedelta(days=age_limit) 38 return datetime.datetime.now() >= expiration
|
/external/skia/infra/bots/recipe_modules/swarming/ |
D | api.py | 410 expiration=self.default_expiration, 456 '--expiration', str(task.expiration), 797 env, priority, shards, buildername, buildnumber, expiration, argument 864 self.expiration = expiration
|
/external/ltp/testcases/open_posix_testsuite/functional/timers/ |
D | plan.txt | 73 - Set timer expiration to: 0, a large number, all the dates that were 83 expiration time.) 84 - Test out all the various events that can be sent for a timer expiration.
|
/external/libmicrohttpd/doc/chapters/ |
D | sessions.inc | 9 adding an expiration time to the cookie. The server creates a fresh session cookie whenever 43 @heading Remark: Session expiration
|
/external/libcups/cups/ |
D | tls-darwin.c | 768 time_t expiration; /* Expiration date */ in httpCredentialsGetExpiration() local 774 expiration = (time_t)(SecCertificateNotValidAfter(secCert) + kCFAbsoluteTimeIntervalSince1970); in httpCredentialsGetExpiration() 778 return (expiration); in httpCredentialsGetExpiration() 811 time_t expiration; /* Expiration date of cert */ in httpCredentialsString() local 822 expiration = (time_t)(SecCertificateNotValidAfter(secCert) + kCFAbsoluteTimeIntervalSince1970); in httpCredentialsString() 826 …%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X", name, httpGetDateString(expiration), md5_digest[0],… in httpCredentialsString()
|
D | tls-gnutls.c | 650 time_t expiration; /* Expiration date of cert */ in httpCredentialsString() local 659 expiration = gnutls_x509_crt_get_expiration_time(cert); in httpCredentialsString() 663 …%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X", name, httpGetDateString(expiration), md5_digest[0],… in httpCredentialsString()
|
/external/llvm/include/llvm-c/ |
D | lto.h | 711 unsigned expiration);
|
/external/python/cpython2/Doc/library/ |
D | signal.rst | 105 Decrements interval timer in real time, and delivers :const:`SIGALRM` upon expiration. 111 SIGVTALRM upon expiration. 119 in user and kernel space. SIGPROF is delivered upon expiration.
|
/external/llvm/tools/lto/ |
D | lto.cpp | 537 unsigned expiration) { in thinlto_codegen_set_cache_entry_expiration() argument 538 return unwrap(cg)->setCacheEntryExpiration(expiration); in thinlto_codegen_set_cache_entry_expiration()
|
/external/ltp/testcases/kernel/controllers/freezer/ |
D | 00_description.txt | 31 recognize that its expiration time has long since passed, and exit
|
/external/curl/docs/ |
D | HTTP-COOKIES.md | 11 the cookies aren't session cookies they have expiration dates after which
|