/external/iptables/include/linux/netfilter_ipv4/ |
ipt_policy.h | 31 reqid:1; member in struct:ipt_policy_spec 47 u_int32_t reqid; member in struct:ipt_policy_elem
|
/external/iptables/include/linux/netfilter_ipv6/ |
ip6t_policy.h | 27 reqid:1; member in struct:ip6t_policy_spec 43 u_int32_t reqid; member in struct:ip6t_policy_elem
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/netfilter/ |
xt_policy.h | 27 reqid:1; member in struct:xt_policy_spec 43 u_int32_t reqid; member in struct:xt_policy_elem
|
/hardware/broadcom/wlan/bcm4329/src/dhd/sys/ |
dhd_cdc.c | 64 uint16 reqid; member in struct:dhd_prot 145 msg->flags = (++prot->reqid << CDCF_IOC_ID_SHIFT); 159 if ((ret = dhdcdc_cmplt(dhd, prot->reqid, len)) < 0) 165 if ((id < prot->reqid) && (++retries < RETRIES)) 167 if (id != prot->reqid) { 169 dhd_ifname(dhd, ifidx), __FUNCTION__, id, prot->reqid)); 212 msg->flags = (++prot->reqid << CDCF_IOC_ID_SHIFT) | CDCF_IOC_SET; 222 if ((ret = dhdcdc_cmplt(dhd, prot->reqid, len)) < 0) 228 if (id != prot->reqid) { 230 dhd_ifname(dhd, ifidx), __FUNCTION__, id, prot->reqid)); [all...] |
/external/iptables/extensions/ |
libipt_policy.c | 33 "[!] --reqid reqid match reqid\n" 60 .name = "reqid", 171 if (e->match.reqid) 173 "policy match: double --reqid option"); 175 e->match.reqid = 1; 176 e->invert.reqid = invert; 177 e->reqid = strtol(argv[optind-1], NULL, 10); 291 !(e->match.reqid || e->match.spi || e->match.saddr | [all...] |
libip6t_policy.c | 34 "[!] --reqid reqid match reqid\n" 61 .name = "reqid", 211 if (e->match.reqid) 213 "policy match: double --reqid option"); 215 e->match.reqid = 1; 216 e->invert.reqid = invert; 217 e->reqid = strtol(argv[optind-1], NULL, 10); 331 !(e->match.reqid || e->match.spi || e->match.saddr | [all...] |
/external/ppp/pppd/ |
fsm.h | 72 u_char reqid; /* Current request id */ member in struct:fsm
|
fsm.c | 222 fsm_sdata(f, TERMREQ, f->reqid = ++f->id, 298 fsm_sdata(f, TERMREQ, f->reqid = ++f->id, 490 if (id != f->reqid || f->seen_ack) /* Expected id? */ 551 if (id != f->reqid || f->seen_ack) /* Expected id? */ 763 f->reqid = ++f->id; 782 fsm_sdata(f, CONFREQ, f->reqid, outp, cilen);
|
ccp.c | 494 if (ccp_localstate[f->unit] & RACK_PENDING && id == f->reqid) { [all...] |
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
xfrm.h | 215 __u32 reqid; member in struct:xfrm_user_tmpl 322 __u32 reqid; member in struct:xfrm_usersa_info 344 __u32 reqid; member in struct:xfrm_aevent_id 412 __u32 reqid; member in struct:xfrm_user_migrate
|
/external/iproute2/include/linux/ |
xfrm.h | 227 __u32 reqid; member in struct:xfrm_user_tmpl 336 __u32 reqid; member in struct:xfrm_usersa_info 360 __u32 reqid; member in struct:xfrm_aevent_id 439 __u32 reqid; member in struct:xfrm_user_migrate 446 __u32 reqid; member in struct:xfrm_user_mapping
|
/external/iproute2/ip/ |
xfrm.h | 132 __u8 mode, __u32 reqid, __u16 family, int force_spi, 152 int xfrm_reqid_parse(__u32 *reqid, int *argcp, char ***argvp);
|
ipxfrm.c | 280 __u8 mode, __u32 reqid, __u16 family, int force_spi, 310 fprintf(fp, "reqid %u", reqid); 312 fprintf(fp, "(0x%08x)", reqid); 588 tmpl->reqid, tmpl->family, 0, fp, prefix, "tmpl "); 764 xsinfo->reqid, xsinfo->family, force_spi, fp, 1018 /* NOTE: reqid is used by host-byte order */ 1019 int xfrm_reqid_parse(__u32 *reqid, int *argcp, char ***argvp) 1024 if (get_u32(reqid, *argv, 0)) 1025 invarg("\"REQID\" is invalid", *argv) [all...] |
xfrm_state.c | 59 fprintf(stderr, " [ reqid REQID ] [ seq SEQ ] [ replay-window SIZE ] [ flag FLAG-LIST ]\n"); 62 fprintf(stderr, "Usage: ip xfrm state allocspi ID [ mode MODE ] [ reqid REQID ] [ seq SEQ ]\n"); 65 fprintf(stderr, "Usage: ip xfrm state { deleteall | list } [ ID ] [ mode MODE ] [ reqid REQID ]\n"); 83 //fprintf(stderr, "REQID - number(default=0)\n"); 263 } else if (strcmp(*argv, "reqid") == 0) { 265 xfrm_reqid_parse(&req.xsinfo.reqid, &argc, &argv); 541 } else if (strcmp(*argv, "reqid") == 0) [all...] |
xfrm_monitor.c | 242 fprintf(fp, " reqid 0x%x", id->reqid);
|
xfrm_policy.c | 85 fprintf(stderr, "TMPL := ID [ mode MODE ] [ reqid REQID ] [ level LEVEL ]\n"); 97 //fprintf(stderr, "REQID - number(default=0)\n"); 185 } else if (strcmp(*argv, "reqid") == 0) { 187 xfrm_reqid_parse(&tmpl->reqid, &argc, &argv);
|
/external/ipsec-tools/src/racoon/ |
policy.h | 94 u_int32_t reqid; /* reqid id who owned this SA */ member in struct:secasindex
|
backupsa.c | 76 * src dst satype spi mode reqid wsize \ 153 sa_args->mode, sa_args->reqid, sa_args->wsize, sa_args->e_type, 271 GETNEXTNUM(sa_args.reqid, strtoul);
|
proposal.c | 950 "encmode=%s reqid=%d:%d)\n", 1119 newpr->reqid_out = req->saidx.reqid; 1121 newpr->reqid_in = req->saidx.reqid; 1142 pr->reqid_in = req->saidx.reqid; 1144 pr->reqid_out = req->saidx.reqid; 1254 * risk of reusing the same reqid
|
pfkey.c | 1127 sa_args.reqid = pr->reqid_in; [all...] |
/external/ipsec-tools/src/libipsec/ |
pfkey.c | 377 pfkey_send_getspi(so, satype, mode, src, dst, min, max, reqid, seq) 381 u_int32_t min, max, reqid, seq; 441 p = pfkey_setsadbxsa2(p, ep, mode, reqid); 1358 p = pfkey_setsadbxsa2(p, ep, sa_parms->mode, sa_parms->reqid); [all...] |
libpfkey.h | 75 u_int32_t reqid; member in struct:pfkey_send_sa_args
|