/external/chromium_org/remoting/host/ |
H A D | register_support_host_request.cc | 34 const char kSupportIdLifetimeTag[] = "support-id-lifetime"; 109 base::TimeDelta* lifetime) { 161 *lifetime = base::TimeDelta::FromSeconds(lifetime_int); 168 base::TimeDelta lifetime; local 169 bool success = ParseResponse(response, &support_id, &lifetime); 170 CallCallback(success, support_id, lifetime); 174 bool success, const std::string& support_id, base::TimeDelta lifetime) { 183 callback.Run(success, support_id, lifetime); 107 ParseResponse(const XmlElement* response, std::string* support_id, base::TimeDelta* lifetime) argument 173 CallCallback( bool success, const std::string& support_id, base::TimeDelta lifetime) argument
|
H A D | register_support_host_request.h | 70 std::string* support_id, base::TimeDelta* lifetime); 73 bool success, const std::string& support_id, base::TimeDelta lifetime);
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/ |
H A D | racoon.conf | 29 lifetime time 1 hour;
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
H A D | racoon.conf | 37 lifetime time 1 hour;
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | peerkey_auth.c | 153 u32 lifetime; local 164 2 + RSN_SELECTOR_LEN + sizeof(lifetime); 182 lifetime = htonl(43200); /* dot11RSNAConfigSMKLifetime */ 184 (u8 *) &lifetime, sizeof(lifetime), NULL, 0); 206 u32 lifetime; local 218 2 + RSN_SELECTOR_LEN + sizeof(lifetime); 239 lifetime = htonl(43200); /* dot11RSNAConfigSMKLifetime */ 241 (u8 *) &lifetime, sizeof(lifetime), NUL [all...] |
H A D | wpa_auth_ie.h | 27 const u8 *lifetime; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/src/ap/ |
H A D | peerkey_auth.c | 153 u32 lifetime; local 164 2 + RSN_SELECTOR_LEN + sizeof(lifetime); 182 lifetime = htonl(43200); /* dot11RSNAConfigSMKLifetime */ 184 (u8 *) &lifetime, sizeof(lifetime), NULL, 0); 206 u32 lifetime; local 218 2 + RSN_SELECTOR_LEN + sizeof(lifetime); 239 lifetime = htonl(43200); /* dot11RSNAConfigSMKLifetime */ 241 (u8 *) &lifetime, sizeof(lifetime), NUL [all...] |
H A D | wpa_auth_ie.h | 27 const u8 *lifetime; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | peerkey_auth.c | 153 u32 lifetime; local 164 2 + RSN_SELECTOR_LEN + sizeof(lifetime); 182 lifetime = htonl(43200); /* dot11RSNAConfigSMKLifetime */ 184 (u8 *) &lifetime, sizeof(lifetime), NULL, 0); 206 u32 lifetime; local 218 2 + RSN_SELECTOR_LEN + sizeof(lifetime); 239 lifetime = htonl(43200); /* dot11RSNAConfigSMKLifetime */ 241 (u8 *) &lifetime, sizeof(lifetime), NUL [all...] |
H A D | wpa_auth_ie.h | 27 const u8 *lifetime; member in struct:wpa_eapol_ie_parse
|
/external/ipsec-tools/src/racoon/ |
H A D | proposal.c | 214 /* see proposal.h about lifetime/key length and PFS selection. */ 216 /* check time/bytes lifetime and PFS */ 219 newpp->lifetime = pp1->lifetime; 225 if (pp1->lifetime > pp2->lifetime) { 227 "long lifetime proposed: " 229 (int)pp2->lifetime, (int)pp1->lifetime); 239 newpp->lifetime [all...] |
H A D | sainfo.h | 53 time_t lifetime; member in struct:sainfo
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.c | 387 be32 lifetime; local 390 2 + RSN_SELECTOR_LEN + sizeof(lifetime); 421 lifetime = host_to_be32(peerkey->lifetime); 423 (u8 *) &lifetime, sizeof(lifetime)); 518 u32 lifetime; local 535 kde.lifetime == NULL || kde.lifetime_len < 4) { 567 lifetime = WPA_GET_BE32(kde.lifetime); 663 be32 lifetime; local 734 u32 lifetime; local [all...] |
H A D | tdls.c | 105 u32 lifetime; member in struct:wpa_tdls_peer 618 * On TPK lifetime expiration, we have an option of either tearing down 626 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR 630 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR 1158 peer->lifetime = TPK_LIFETIME; 1162 "lifetime"); 1163 peer->lifetime = 301; 1167 "lifetime"); 1168 peer->lifetime = 0xffffffff; 1172 sizeof(timeoutie), peer->lifetime); 1207 u32 lifetime; local 1300 u32 lifetime; local 1744 u32 lifetime = 0; local 2086 u32 lifetime = peer->lifetime; local 2125 u32 lifetime; local 2401 u32 lifetime; local 2551 struct wpa_tdls_timeoutie *lifetime = (struct wpa_tdls_timeoutie *) ie; local [all...] |
H A D | wpa_ie.h | 29 const u8 *lifetime; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.c | 387 be32 lifetime; local 390 2 + RSN_SELECTOR_LEN + sizeof(lifetime); 421 lifetime = host_to_be32(peerkey->lifetime); 423 (u8 *) &lifetime, sizeof(lifetime)); 518 u32 lifetime; local 535 kde.lifetime == NULL || kde.lifetime_len < 4) { 567 lifetime = WPA_GET_BE32(kde.lifetime); 663 be32 lifetime; local 734 u32 lifetime; local [all...] |
H A D | tdls.c | 105 u32 lifetime; member in struct:wpa_tdls_peer 618 * On TPK lifetime expiration, we have an option of either tearing down 626 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR 630 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR 1158 peer->lifetime = TPK_LIFETIME; 1162 "lifetime"); 1163 peer->lifetime = 301; 1167 "lifetime"); 1168 peer->lifetime = 0xffffffff; 1172 sizeof(timeoutie), peer->lifetime); 1207 u32 lifetime; local 1300 u32 lifetime; local 1744 u32 lifetime = 0; local 2086 u32 lifetime = peer->lifetime; local 2125 u32 lifetime; local 2401 u32 lifetime; local 2551 struct wpa_tdls_timeoutie *lifetime = (struct wpa_tdls_timeoutie *) ie; local [all...] |
H A D | wpa_ie.h | 29 const u8 *lifetime; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 387 be32 lifetime; local 390 2 + RSN_SELECTOR_LEN + sizeof(lifetime); 421 lifetime = host_to_be32(peerkey->lifetime); 423 (u8 *) &lifetime, sizeof(lifetime)); 518 u32 lifetime; local 535 kde.lifetime == NULL || kde.lifetime_len < 4) { 567 lifetime = WPA_GET_BE32(kde.lifetime); 663 be32 lifetime; local 734 u32 lifetime; local [all...] |
H A D | tdls.c | 105 u32 lifetime; member in struct:wpa_tdls_peer 618 * On TPK lifetime expiration, we have an option of either tearing down 626 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR 630 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR 1158 peer->lifetime = TPK_LIFETIME; 1162 "lifetime"); 1163 peer->lifetime = 301; 1167 "lifetime"); 1168 peer->lifetime = 0xffffffff; 1172 sizeof(timeoutie), peer->lifetime); 1207 u32 lifetime; local 1300 u32 lifetime; local 1744 u32 lifetime = 0; local 2086 u32 lifetime = peer->lifetime; local 2125 u32 lifetime; local 2401 u32 lifetime; local 2551 struct wpa_tdls_timeoutie *lifetime = (struct wpa_tdls_timeoutie *) ie; local [all...] |
H A D | wpa_ie.h | 29 const u8 *lifetime; member in struct:wpa_eapol_ie_parse
|
/external/chromium_org/components/copresence/ |
H A D | timed_map.h | 23 // key/value pair after its specified lifetime is over. 27 TimedMap(const base::TimeDelta& lifetime, size_t max_elements) argument 30 lifetime_(lifetime),
|
/external/tcpdump/ |
H A D | print-icmp.c | 452 u_int lifetime, num, size; local 459 (void)strncpy(cp, " lifetime ", sizeof(buf) - (cp - buf)); 461 lifetime = EXTRACT_16BITS(&ihp->ird_lifetime); 462 if (lifetime < 60) { 464 lifetime); 465 } else if (lifetime < 60 * 60) { 467 lifetime / 60, lifetime % 60); 471 lifetime / 3600, 472 (lifetime [all...] |
/external/chromium_org/chrome/browser/net/ |
H A D | referrer.cc | 82 // and least is lifetime (age). 90 int64 lifetime = (kNow - it->second.birth_time()).InMilliseconds(); local 95 if (lifetime <= least_useful_lifetime) 100 least_useful_lifetime = lifetime;
|
/external/chromium_org/third_party/angle/samples/angle/particle_system/ |
H A D | ParticleSystem.cpp | 99 mParticles[i].lifetime = RandomBetween(0.0f, 1.0f); 175 glVertexAttribPointer(mLifetimeLoc, 1, GL_FLOAT, GL_FALSE, sizeof(Particle), &mParticles[0].lifetime); 218 float lifetime; member in struct:ParticleSystemSample::Particle
|