Lines Matching refs:lifetime

173 static int key_blockacq_lifetime = 20;	/* lifetime for blocking SADB_ACQUIRE.*/
290 /* lifetime for larval SA; thread safe due to > compare */
298 /* lifetime for blocking to send SADB_ACQUIRE to IKEd: Thread safe, > compare */
1012 * suitable candidate and the lifetime of the SA is not
2071 * <base, address(SD), (lifetime(H),) policy>
2075 * <base, address(SD), (lifetime(H),) policy>
2251 newsp->lifetime = lft ? lft->sadb_lifetime_addtime : 0;
2934 * <base, address(SD), lifetime(CH), policy>
2963 /* create lifetime extension (current and hard) */
2985 lt->sadb_lifetime_addtime = sp->lifetime;
3778 /* make lifetime for CURRENT */
3811 ipseclog((LOG_DEBUG, "key_setsaval: invalid hard lifetime ext len.\n"));
3829 ipseclog((LOG_DEBUG, "key_setsaval: invalid soft lifetime ext len.\n"));
4021 /* make lifetime for CURRENT */
5229 if (sp->lifetime == 0 && sp->validtime == 0)
5233 if ((sp->lifetime
5234 && tv.tv_sec - sp->created > sp->lifetime)
5333 /* check SOFT lifetime */
5353 /* check SOFT lifetime by bytes */
5357 * installed too big lifetime by time.
5402 #if 0 /* XXX Should we keep to send expire message until HARD lifetime ? */
5422 /* check HARD lifetime by bytes */
6053 * <base, SA, (SA2), (lifetime(HSC),) address(SD), (address(P),)
6057 * <base, SA, (SA2), (lifetime(HSC),) address(SD), (address(P),)
6275 * <base, SA, (SA2), (lifetime(HSC),) address(SD), (address(P),)
6279 * <base, SA, (SA2), (lifetime(HSC),) address(SD), (address(P),)
6755 * <base, SA, (lifetime(HSC),) address(SD), (address(P),) key(AE),
7842 * <base, SA, SA2, lifetime(C and one of HS), address(SD)>
7844 * NOTE: We send only soft lifetime extension.
7895 /* create lifetime extension (current and soft) */
8773 /* to check bytes lifetime is done in key_timehandler(). */
8785 * in seconds. HARD and SOFT lifetime are measured by the time