/macosx-10.10.1/network_cmds-457/rtadvd.tproj/ |
H A D | dump.c | 170 "MinAdvInterval: %d\n", rai->lifetime, rai->maxinterval, 254 fprintf(fp, "lifetime: infinity"); 256 fprintf(fp, "lifetime: %ld", (long)rti->ltime);
|
H A D | config.c | 250 "<%s> router lifetime (%ld) on %s is invalid " 262 * only when router lifetime (on every advertising interface) is 267 "<%s> non zero router lifetime is specified for %s, " 269 "change router lifetime or enable IPv6 forwarding.", 273 tmp->lifetime = val & 0xffff; 593 * with this field being optional, we use the router lifetime 608 val64 = tmp->lifetime; 612 syslog(LOG_ERR, "<%s> route lifetime (%lld) for " 687 /* Parse the DNSSL lifetime from the config */ 883 * XXX: other parameters of the prefix (e.g. lifetime) shoul [all...] |
H A D | rtadvd.c | 348 ra->lifetime = 0; 1111 * The lifetime is decremented in real time, so we should 1123 "<%s> preferred lifetime for %s/%d" 1138 "<%s> preferred lifetime for %s/%d" 1159 "<%s> valid lifetime for %s/%d" 1174 "<%s> valid lifetime for %s/%d"
|
/macosx-10.10.1/xnu-2782.1.97/bsd/netinet6/ |
H A D | ipsec.h | 108 * lifetime handler. 109 * the policy can be used without limitiation if both lifetime and 111 * "lifetime" is passed by sadb_lifetime.sadb_lifetime_addtime. 116 long lifetime; /* duration of the lifetime of this policy */ member in struct:secpolicy 145 long created; /* for lifetime */ 146 int count; /* for lifetime */
|
/macosx-10.10.1/ntp-92/ntpd/ |
H A D | ntp_crypto.c | 196 u_long lifetime /* key lifetime */ 209 * Generate the session key and key ID. If the lifetime is 237 if (lifetime != 0) { 239 authtrust(keyno, lifetime); 243 private, keyid, lifetime)); 274 long lifetime; local 311 lifetime = min(1 << sys_automax, NTP_MAXSESSION * mpoll); 320 cookie, lifetime + mpoll); 321 lifetime [all...] |
/macosx-10.10.1/bind9-45.101/bind9/contrib/zkt/ |
H A D | dnssec-zkt.c | 74 int lifetime = 0; variable 106 {"lifetime", no_argument, NULL, 'f'}, 227 case 'f': /* key lifetime */ 230 case 'F': /* set key lifetime */ 231 lifetime = atoi (optarg); 477 fprintf (stderr, "\t-f%s\t print key lifetime\n", loptstr (", --lifetime", "\t")); 478 fprintf (stderr, "\t-F days%s=days\t set key lifetime\n", loptstr (", --setlifetime", "\t"));
|
H A D | zconf.c | 927 ret = fprintf (stderr, "signature lifetime (%ld) (%s)\n", z->sigvalidity, timeint2str(z->sigvalidity - max_ttl)); 940 ret = fprintf (stderr, "should be greater than lifetime of zsk\n");
|
H A D | zkt-keyman.c | 74 int lifetime = 0; variable 205 case 'F': /* set key lifetime */ 206 lifetime = atoi (optarg); 385 fprintf (stderr, "\t-F days%s=days\t set key lifetime\n", loptstr (", --setlifetime", "\t"));
|
H A D | zkt-ls.c | 75 int lifetime = 0; variable 103 {"lifetime", no_argument, NULL, 'f'}, 198 case 'f': /* key lifetime */ 356 fprintf (stderr, "\t-f%s\t print key lifetime\n", loptstr (", --lifetime", "\t"));
|
/macosx-10.10.1/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | pfkey_racoon.c | 1202 0, lifebyte, iph2->approval->lifetime, 0, 1222 0, lifebyte, iph2->approval->lifetime, 0, 1386 iph2->sce = sched_new(iph2->approval->lifetime, 1518 0, lifebyte, iph2->approval->lifetime, 0, 1543 0, lifebyte, iph2->approval->lifetime, 0, 2217 ltime = iph2->approval->lifetime; 2318 ltime = iph2->approval->lifetime;
|
H A D | cftoken.l | 277 <S_SAINFS>lifetime { YYD; return(LIFETIME); } 363 <S_RMTS>lifetime { YYD; return(LIFETIME); } 382 <S_RMTP>lifetime { YYD; return(LIFETIME); }
|
H A D | remoteconf.c | 714 (long)prop->lifetime);
|
/macosx-10.10.1/Heimdal-398.1.2/lib/krb5/ |
H A D | cache.c | 1226 time_t lifetime; local 1242 (krb5_cc_get_lifetime(context, cache, &lifetime) != 0 || lifetime == 0)) { 1737 * Get the aproximate lifetime of credential cache 1743 * @param t the relative lifetime of cache. 1783 * If there was no krbtgt, use the shortest lifetime of
|
/macosx-10.10.1/MITKerberosShim-66/include/ |
H A D | mit-CredentialsCache.h | 167 * The lifetime of an object returned by the API is until release() is called 530 /*! Ticket lifetime in 5 minute units */ 531 cc_int32 lifetime; member in struct:cc_credentials_v4_t
|
/macosx-10.10.1/Heimdal-398.1.2/lib/gssapi/krb5/ |
H A D | gsskrb5-private.h | 678 OM_uint32 * lifetime, 737 OM_uint32 *lifetime);
|
/macosx-10.10.1/KerberosHelper-151/Source/ |
H A D | KerberosHelper.c | 1245 time_t lifetime; local 1256 krb_err = krb5_cc_get_lifetime(hCtx->krb5_ctx, ccache, &lifetime); 1257 if (krb_err == 0 && lifetime > 60) {
|
/macosx-10.10.1/apache-793/httpd/modules/aaa/ |
H A D | mod_auth_digest.c | 387 /* Note: this stuff is currently fixed for the lifetime of the server, 557 long lifetime; local 559 lifetime = strtol(t, &endptr, 10); 566 ((digest_config_rec *) config)->nonce_lifetime = apr_time_from_sec(lifetime); 668 "Maximum lifetime of the server nonce (seconds)"), 1523 "- max lifetime %.2f) - sending new nonce", 1539 /* else (lifetime < 0) => never expires */
|
/macosx-10.10.1/network_cmds-457/alias/ |
H A D | alias_db.c | 1993 FindAliasPortOut(struct in_addr src_addr, struct in_addr dst_addr, u_short src_port, u_short pub_port, u_char proto, int lifetime, char addmapping) argument 2018 printf("dstadd= %s:%u link_type= %d, lifetime= %d\n", 2019 inet_ntoa(dst_addr), ntohs(pub_port), link_type, lifetime); 2076 /* link was create, set new lifetime */ 2077 SetExpire(link, lifetime);
|
/macosx-10.10.1/tcpdump-61/tcpdump/ |
H A D | print-isoclns.c | 756 u_int8_t lifetime; /* units of 500ms */ member in struct:clnp_header_t 828 printf("\n\t%s PDU, hlen: %u, v: %u, lifetime: %u.%us, Segment PDU length: %u, checksum: 0x%04x", 832 clnp_header->lifetime/2, 833 (clnp_header->lifetime%2)*5, 2197 printf(", lsp-id %s, seq 0x%08x, lifetime %5us", 2324 printf("\n\t lsp-id: %s, seq: 0x%08x, lifetime: %5us\n\t chksum: 0x%04x", 2335 * Clear checksum and lifetime prior to signature verification. 2877 printf(", lifetime: %5ds",EXTRACT_16BITS(tlv_lsp->remaining_lifetime));
|
/macosx-10.10.1/CPANInternal-159.1/Authen-Krb5/ |
H A D | Krb5.xs | 323 krb5_deltat lifetime = 0; 350 krb5_deltat lifetime = 0;
|
/macosx-10.10.1/Heimdal-398.1.2/lib/gssapi/gssapi/ |
H A D | gssapi_protos.h | 505 OM_uint32 *lifetime,
|
/macosx-10.10.1/MITKerberosShim-66/Kerberos/ |
H A D | CredentialsCache.h | 180 * The lifetime of an object returned by the API is until release() is called 543 /*! Ticket lifetime in 5 minute units */ 544 cc_int32 lifetime; member in struct:cc_credentials_v4_t
|
/macosx-10.10.1/MITKerberosShim-66/ |
H A D | Krb4DeprecatedAPIs.c | 194 int get_ad_tkt (char *service, char *sinstance, char *realm, int lifetime) argument
|
/macosx-10.10.1/mDNSResponder-561.1.1/mDNSMacOSX/ |
H A D | daemon.c | 2353 const mDNSu32 lifetime = (mDNSs32) ((mDNSs32)d[0] << 24 | (mDNSs32)d[1] << 16 | (mDNSs32)d[2] << 8 | d[3]); local 2354 const mDNSu32 remaining = lifetime - elapsed; 2356 LogSPS("DHCP Address Lease Elapsed %6u Lifetime %6u Remaining %6u Wake %6u", elapsed, lifetime, remaining, wake);
|
/macosx-10.10.1/mDNSResponder-561.1.1/mDNSCore/ |
H A D | uDNS.c | 589 mDNSu8* p = (mDNSu8*)&req.lifetime; 3720 reply->lifetime = (mDNSs32)((mDNSs32)pkt[4] << 24 | (mDNSs32)pkt[5] << 16 | (mDNSs32)pkt[ 6] << 8 | pkt[ 7]); 3800 LogInfo("uDNS_ReceivePCPPacket: error received from server. opcode %X result %X lifetime %X epoch %X", 3801 reply->opCode, reply->result, reply->lifetime, reply->epoch); 3818 natTraversalHandlePortMapReplyWithAddress(m, ptr, InterfaceID, reply->result ? NATErr_NetFail : NATErr_None, mappedAddress, extport, reply->lifetime, NATTProtocolPCP);
|