/external/zlib/src/examples/ |
H A D | gzlog.c | 369 /* Update the modify time of the lock file to now, in order to prevent another 720 time_t now; local 723 now = time(NULL); 728 fprintf(rec, "%.24s %s recovery: %s\n", ctime(&now), op == APPEND_OP ?
|
/external/webrtc/src/system_wrappers/interface/ |
H A D | tick_util.h | 153 DWORD now = timeGetTime(); local 155 DWORD old = InterlockedExchange(lastTimeGetTimePtr, now); 156 if(now < old) 158 // If now is earlier than old, there may have been a race between 162 if(old > 0xf0000000 && now < 0x0fffffff) 167 result._ticks = now + (numWrapTimeGetTime<<32); 202 TickTime now = TickTime::Now(); local 207 return (now._ticks * 1000) / qpfreq.QuadPart; 209 return now._ticks; 212 return now 220 TickTime now = TickTime::Now(); local [all...] |
/external/webrtc/src/system_wrappers/source/ |
H A D | cpu_mac.cc | 84 WebRtc_Word64 now = TickTime::MillisecondTimestamp(); local 85 WebRtc_Word64 timeDiffMS = now - _lastTime; 92 _lastTime = now;
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | accounting.c | 245 struct os_time now; local 260 os_get_time(&now); 318 now.sec)) { 451 struct os_time now; local 455 os_get_time(&now); 456 hapd->acct_session_id_hi = now.sec;
|
H A D | ap_list.c | 253 struct os_reltime now; local 262 os_get_reltime(&now); 266 if (!os_reltime_expired(&now, &ap->last_beacon,
|
H A D | ctrl_iface_ap.c | 436 struct os_reltime now; local 439 os_reltime_age(&iface->dfs_cac_start, &now); 440 left_time = iface->dfs_cac_ms / 1000 - now.sec;
|
H A D | ieee802_11.c | 218 struct os_time now; local 224 os_get_time(&now); 226 os_memcpy(key, &now.sec, 4); 418 struct os_reltime now; local 420 os_get_reltime(&now); 422 os_reltime_expired(&now, &hapd->last_sae_token_key_update, 60)) { 428 hapd->last_sae_token_key_update = now; 1441 * unprotected frame would be received by the STA that is now 2003 * so bind it to the selected VLAN interface now, since the
|
H A D | ieee802_11_auth.c | 107 struct os_reltime now; local 109 os_get_reltime(&now); 115 if (os_reltime_expired(&now, &entry->timestamp, 341 struct os_reltime *now) 349 if (os_reltime_expired(now, &entry->timestamp, 371 struct os_reltime *now) 379 if (os_reltime_expired(now, &entry->timestamp, 408 struct os_reltime now; local 410 os_get_reltime(&now); 411 hostapd_acl_expire_cache(hapd, &now); 340 hostapd_acl_expire_cache(struct hostapd_data *hapd, struct os_reltime *now) argument 370 hostapd_acl_expire_queries(struct hostapd_data *hapd, struct os_reltime *now) argument [all...] |
H A D | ieee802_11_shared.c | 27 struct os_reltime now, passed; local 32 os_get_reltime(&now); 33 os_reltime_sub(&now, &sta->sa_query_start, &passed);
|
H A D | pmksa_cache_auth.c | 96 struct os_reltime now; local 98 os_get_reltime(&now); 99 while (pmksa->pmksa && pmksa->pmksa->expiration <= now.sec) { 112 struct os_reltime now; local 117 os_get_reltime(&now); 118 sec = pmksa->pmksa->expiration - now.sec; 249 struct os_reltime now; local 261 os_get_reltime(&now); 262 entry->expiration = now.sec;
|
H A D | sta_info.c | 353 * but do not disconnect the station now. 862 struct os_reltime now, passed; local 863 os_get_reltime(&now); 864 os_reltime_sub(&now, &sta->sa_query_start, &passed);
|
H A D | tkip_countermeasures.c | 71 struct os_reltime now; local 92 os_get_reltime(&now); 93 if (os_reltime_expired(&now, &hapd->michael_mic_failure, 60)) { 102 hapd->michael_mic_failure = now;
|
H A D | wpa_auth_ft.c | 1512 struct os_time now; local 1545 os_get_time(&now); 1547 if ((now.sec > tsend && now.sec - tsend > 60) || 1548 (now.sec < tsend && tsend - now.sec > 60)) { 1551 (int) tsend, (int) now.sec); 1712 struct os_time now; local 1731 os_get_time(&now); 1732 WPA_PUT_LE32(f.timestamp, now [all...] |
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_helpers.c | 107 time_t start, now; local 147 time(&now); 148 if ((int) (now - start) > default_timeout) {
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_gnutls.c | 37 * derivation in EAP-{TLS,TTLS,PEAP,FAST}. Workaround for now is a horrible 807 struct os_time now; local 853 os_get_time(&now); 898 if (gnutls_x509_crt_get_expiration_time(cert) < now.sec || 899 gnutls_x509_crt_get_activation_time(cert) > now.sec) {
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_fast.c | 904 struct os_time now; local 922 os_get_time(&now); 925 lifetime, (lifetime - (u32) now.sec) / 86400);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_fast.c | 130 struct os_time now; local 172 * failing the authentication completely. Provisioning can now 241 if (os_get_time(&now) < 0 || lifetime <= 0 || now.sec > lifetime) { 243 "(lifetime=%ld now=%ld)", lifetime, now.sec); 249 * able to validate server certificate now). However, reject 253 } else if (lifetime - now.sec < data->pac_key_refresh_time) { 689 struct os_time now; local 692 os_get_time(&now) < [all...] |
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p.c | 54 struct os_reltime now; local 57 os_get_reltime(&now); 59 if (dev->last_seen.sec + P2P_PEER_EXPIRATION_AGE >= now.sec) 823 * At least for now, do this only if the peer was detected on 3071 * now peer is awaiting response from our side. 3368 struct os_reltime now; local 3375 os_get_reltime(&now); 3376 if (os_reltime_expired(&now, &dev->go_neg_wait_started, 120)) { 3637 struct os_reltime now; local 3648 os_get_reltime(&now); [all...] |
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay.c | 2345 time_t now = time(NULL); local 2353 if (now > participant->cak_life) { 2366 if (now > participant->mka_life) { 2382 if (now > peer->expire) { 2437 if (now > peer->expire) {
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_client.c | 331 os_time_t now) 370 entry->next_try = now + entry->next_wait; 387 struct os_reltime now; local 399 os_get_reltime(&now); 405 if (now.sec >= entry->next_try && 406 radius_client_retransmit(radius, entry, now.sec)) { 446 if (first < now.sec) 447 first = now.sec; 448 eloop_register_timeout(first - now.sec, 0, 453 (long int) (first - now 329 radius_client_retransmit(struct radius_client_data *radius, struct radius_msg_list *entry, os_time_t now) argument 509 struct os_reltime now; local 720 struct os_reltime now; local [all...] |
H A D | radius_das.c | 193 struct os_time now; local 230 os_get_time(&now); 235 if ((unsigned int) abs(now.sec - timestamp) > 240 timestamp, (unsigned int) now.sec, 282 now.sec)) {
|
H A D | radius_server.c | 375 "'now'),%u,%Q,%Q,%Q)", 1856 struct os_reltime now; local 1867 os_get_reltime(&now); 1868 uptime = (now.sec - data->start_time.sec) * 100 + 1869 ((now.usec - data->start_time.usec) / 10000) % 100;
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | pmksa_cache.c | 56 struct os_reltime now; local 58 os_get_reltime(&now); 59 while (pmksa->pmksa && pmksa->pmksa->expiration <= now.sec) { 83 struct os_reltime now; local 89 os_get_reltime(&now); 90 sec = pmksa->pmksa->expiration - now.sec; 98 sec = pmksa->pmksa->reauth_time - now.sec; 128 struct os_reltime now; local 140 os_get_reltime(&now); 141 entry->expiration = now 469 struct os_reltime now; local [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_write.c | 48 struct os_time now; local 54 os_get_time(&now); 55 WPA_PUT_BE32(conn->client_random, now.sec);
|
H A D | tlsv1_server_write.c | 46 struct os_time now; local 55 os_get_time(&now); 56 WPA_PUT_BE32(conn->server_random, now.sec);
|