/external/ipsec-tools/src/libipsec/ |
test-policy.c | 230 int spid; local 283 spid = test2sub(so); 285 printf("spdget(%u)\n", spid); 286 if (pfkey_send_spdget(so, spid) < 0) 295 if (pfkey_send_spddelete2(so, spid) < 0) 305 spid = test2sub(so);
|
/external/dhcpcd/ |
common.c | 267 char spid[16]; local 272 snprintf(spid, sizeof(spid), "%u\n", pid); 273 len = pwrite(fd, spid, strlen(spid), (off_t)0); 274 if (len != (ssize_t)strlen(spid))
|
/external/dbus/bus/ |
selinux.c | 401 unsigned long spid; local 409 if (!dbus_connection_get_unix_process_id (connection, &spid)) 410 spid = 0; 421 if (spid) 423 if (!_dbus_string_append (&auxdata, " spid=")) 426 if (!_dbus_string_append_uint (&auxdata, spid)) 472 unsigned long spid, tpid; local 480 if (!sender || !dbus_connection_get_unix_process_id (sender, &spid)) 481 spid = 0; 528 if (spid) [all...] |
/external/ipsec-tools/src/racoon/ |
handler.h | 257 u_int32_t spid; /* policy id by kernel */ member in struct:ph2handle
|