/external/ipsec-tools/src/racoon/samples/roadwarrior/client/ |
racoon.conf | 29 lifetime time 1 hour;
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
racoon.conf | 37 lifetime time 1 hour;
|
/external/ipsec-tools/src/racoon/ |
proposal.c | 214 /* see proposal.h about lifetime/key length and PFS selection. */ 216 /* check time/bytes lifetime and PFS */ 219 newpp->lifetime = pp1->lifetime; 225 if (pp1->lifetime > pp2->lifetime) { 227 "long lifetime proposed: " 229 (int)pp2->lifetime, (int)pp1->lifetime); 239 newpp->lifetime = pp1->lifetime [all...] |
sainfo.h | 53 time_t lifetime; member in struct:sainfo
|
proposal.h | 60 time_t lifetime; member in struct:saprop 63 int claim; /* flag to send RESPONDER-LIFETIME. */ 153 * Lifetime length selection refered to the section 4.5.4 of RFC2407. It does 169 * AND send RESPONDER-LIFETIME notify message to a initiator in the 170 * case of lifetime.
|
ipsec_doi.c | 366 plog(LLV_DEBUG, LOCATION, NULL, "(lifetime = %ld:%ld)\n", 367 (long)s->lifetime, (long)tsap->lifetime); 411 if ((tsap->lifetime > s->lifetime) || 418 if (tsap->lifetime < s->lifetime) 419 s->lifetime = tsap->lifetime; 426 if ((tsap->lifetime != s->lifetime) | 2759 u_int32_t lifetime = htonl((u_int32_t)sa->lifetime); local [all...] |
cfparse.y | 99 time_t lifetime; /* for isakmp/ipsec */ 111 time_t lifetime; /* for isakmp */ 234 %token PFS_GROUP LIFETIME LIFETYPE_TIME LIFETYPE_BYTE STRENGTH REMOTEID 1389 | LIFETIME LIFETYPE_TIME NUMBER unittype_time 1391 cur_sainfo->lifetime = $3 * $4; 1394 | LIFETIME LIFETYPE_BYTE NUMBER unittype_byte 1397 yyerror("byte lifetime support is deprecated"); [all...] |
remoteconf.h | 139 time_t lifetime; member in struct:isakmpsa
|
handler.c | 1020 /* set the lifetime of the retransmission */ 1153 if (sainfo->lifetime < approval->lifetime) { 1155 "Reload: lifetime mismatch\n"); 1178 if (sainfo->lifetime != approval->lifetime || 1186 "Reload: lifetime | pfs mismatch\n"); 1417 if (approval->lifetime > p->lifetime) { 1419 "Reload: lifetime mismatch\n") [all...] |
sainfo.c | 172 new->lifetime = IPSECDOI_ATTR_SA_LD_SEC_DEFAULT;
|
cftoken.l | 292 <S_SAINFS>lifetime { YYD; return(LIFETIME); } 349 <S_RMTS>lifetime { YYD; return(LIFETIME); } 368 <S_RMTP>lifetime { YYD; return(LIFETIME); }
|
pfkey.c | 1047 sa_args.l_addtime = iph2->approval->lifetime; 1301 iph2->sce = sched_new(iph2->approval->lifetime, 1334 sa_args.l_addtime = iph2->approval->lifetime; [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
peerkey.c | 398 be32 lifetime; local 401 2 + RSN_SELECTOR_LEN + sizeof(lifetime); 432 lifetime = host_to_be32(peerkey->lifetime); 434 (u8 *) &lifetime, sizeof(lifetime)); 531 u32 lifetime; local 549 kde.lifetime == NULL || kde.lifetime_len < 4) { 551 "Lifetime KDE in SMK M4/M5"); 581 lifetime = WPA_GET_BE32(kde.lifetime) 677 be32 lifetime; local 749 u32 lifetime; local [all...] |
wpa_ie.h | 33 const u8 *lifetime; member in struct:wpa_eapol_ie_parse
|
peerkey.h | 32 u32 lifetime; member in struct:wpa_peerkey
|
wpa_ie.c | 458 ie->lifetime = pos + 2 + RSN_SELECTOR_LEN;
|
/external/tcpdump/ |
print-icmp.c | 451 u_int lifetime, num, size; local 458 (void)strncpy(cp, " lifetime ", sizeof(buf) - (cp - buf)); 460 lifetime = EXTRACT_16BITS(&ihp->ird_lifetime); 461 if (lifetime < 60) { 463 lifetime); 464 } else if (lifetime < 60 * 60) { 466 lifetime / 60, lifetime % 60); 470 lifetime / 3600, 471 (lifetime % 3600) / 60 [all...] |
/external/wpa_supplicant/ |
wpa.c | 1188 const u8 *lifetime; member in struct:wpa_eapol_ie_parse 2458 u32 lifetime; local 2512 u32 lifetime; local 2715 u32 lifetime; local 2786 u32 lifetime; local [all...] |
wpa_i.h | 61 u32 lifetime; member in struct:wpa_peerkey
|
/external/ipsec-tools/ |
setup.c | 104 sainfo.lifetime = IPSECDOI_ATTR_SA_LD_SEC_DEFAULT; 142 p->lifetime = OAKLEY_ATTR_SA_LD_SEC_DEFAULT;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_fast.c | 134 os_time_t lifetime = 0; local 211 "PAC-Key lifetime length %d", 216 lifetime = WPA_GET_BE32(pos + 2); 245 if (os_get_time(&now) < 0 || lifetime <= 0 || now.sec > lifetime) { 247 "(lifetime=%ld now=%ld)", lifetime, now.sec); 257 } else if (lifetime - now.sec < data->pac_key_refresh_time) { 492 /* PAC-Key lifetime in seconds (hard limit) */ 498 * seconds (or fewer) of the lifetime remains [all...] |
/external/chromium/net/http/ |
http_response_headers.cc | 773 TimeDelta lifetime = local 775 if (lifetime == TimeDelta()) 778 return lifetime <= GetCurrentAge(request_time, response_time, current_time); [all...] |
/external/iproute2/doc/ |
api-ip6-flowlabels.tex | 74 Flow labels have finite lifetime and source is not allowed to reuse 75 flow label for another flow within the maximal lifetime has expired, 78 Flow state, including lifetime, is propagated along datagram path
|
/external/iproute2/ip/ |
ipaddress.c | 64 fprintf(stderr, "Usage: ip addr {add|change|replace} IFADDR dev STRING [ LIFETIME ]\n"); 78 fprintf(stderr, "LIFETIME := [ valid_lft LFT ] [ preferred_lft LFT ]\n"); 348 static int set_lifetime(unsigned int *lifetime, char *argv) 351 *lifetime = INFINITY_LIFE_TIME; 352 else if (get_u32(lifetime, argv, 0))
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_fast.c | 878 u32 lifetime; local 896 lifetime = WPA_GET_BE32(pos); 900 lifetime, (lifetime - (u32) now.sec) / 86400); [all...] |