HomeSort by relevance Sort by last modified time
    Searched refs:reqid (Results 1 - 20 of 20) sorted by null

  /external/iptables/include/linux/netfilter_ipv4/
ipt_policy.h 31 reqid:1; member in struct:ipt_policy_spec
47 u_int32_t reqid; member in struct:ipt_policy_elem
  /external/iptables/include/linux/netfilter_ipv6/
ip6t_policy.h 27 reqid:1; member in struct:ip6t_policy_spec
43 u_int32_t reqid; member in struct:ip6t_policy_elem
  /hardware/broadcom/wlan/bcm4329/src/dhd/sys/
dhd_cdc.c 64 uint16 reqid; member in struct:dhd_prot
145 msg->flags = (++prot->reqid << CDCF_IOC_ID_SHIFT);
159 if ((ret = dhdcdc_cmplt(dhd, prot->reqid, len)) < 0)
165 if ((id < prot->reqid) && (++retries < RETRIES))
167 if (id != prot->reqid) {
169 dhd_ifname(dhd, ifidx), __FUNCTION__, id, prot->reqid));
212 msg->flags = (++prot->reqid << CDCF_IOC_ID_SHIFT) | CDCF_IOC_SET;
222 if ((ret = dhdcdc_cmplt(dhd, prot->reqid, len)) < 0)
228 if (id != prot->reqid) {
230 dhd_ifname(dhd, ifidx), __FUNCTION__, id, prot->reqid));
    [all...]
  /external/iptables/extensions/
libipt_policy.c 33 "[!] --reqid reqid match reqid\n"
60 .name = "reqid",
171 if (e->match.reqid)
173 "policy match: double --reqid option");
175 e->match.reqid = 1;
176 e->invert.reqid = invert;
177 e->reqid = strtol(argv[optind-1], NULL, 10);
291 !(e->match.reqid || e->match.spi || e->match.saddr |
    [all...]
libip6t_policy.c 34 "[!] --reqid reqid match reqid\n"
61 .name = "reqid",
211 if (e->match.reqid)
213 "policy match: double --reqid option");
215 e->match.reqid = 1;
216 e->invert.reqid = invert;
217 e->reqid = strtol(argv[optind-1], NULL, 10);
331 !(e->match.reqid || e->match.spi || e->match.saddr |
    [all...]
  /external/ppp/pppd/
fsm.h 72 u_char reqid; /* Current request id */ member in struct:fsm
fsm.c 222 fsm_sdata(f, TERMREQ, f->reqid = ++f->id,
298 fsm_sdata(f, TERMREQ, f->reqid = ++f->id,
490 if (id != f->reqid || f->seen_ack) /* Expected id? */
551 if (id != f->reqid || f->seen_ack) /* Expected id? */
763 f->reqid = ++f->id;
782 fsm_sdata(f, CONFREQ, f->reqid, outp, cilen);
ccp.c 494 if (ccp_localstate[f->unit] & RACK_PENDING && id == f->reqid) {
    [all...]
  /external/iproute2/include/linux/
xfrm.h 227 __u32 reqid; member in struct:xfrm_user_tmpl
336 __u32 reqid; member in struct:xfrm_usersa_info
360 __u32 reqid; member in struct:xfrm_aevent_id
439 __u32 reqid; member in struct:xfrm_user_migrate
446 __u32 reqid; member in struct:xfrm_user_mapping
  /external/iproute2/ip/
xfrm.h 132 __u8 mode, __u32 reqid, __u16 family, int force_spi,
152 int xfrm_reqid_parse(__u32 *reqid, int *argcp, char ***argvp);
ipxfrm.c 280 __u8 mode, __u32 reqid, __u16 family, int force_spi,
310 fprintf(fp, "reqid %u", reqid);
312 fprintf(fp, "(0x%08x)", reqid);
588 tmpl->reqid, tmpl->family, 0, fp, prefix, "tmpl ");
764 xsinfo->reqid, xsinfo->family, force_spi, fp,
1018 /* NOTE: reqid is used by host-byte order */
1019 int xfrm_reqid_parse(__u32 *reqid, int *argcp, char ***argvp)
1024 if (get_u32(reqid, *argv, 0))
1025 invarg("\"REQID\" is invalid", *argv)
    [all...]
xfrm_state.c 59 fprintf(stderr, " [ reqid REQID ] [ seq SEQ ] [ replay-window SIZE ] [ flag FLAG-LIST ]\n");
62 fprintf(stderr, "Usage: ip xfrm state allocspi ID [ mode MODE ] [ reqid REQID ] [ seq SEQ ]\n");
65 fprintf(stderr, "Usage: ip xfrm state { deleteall | list } [ ID ] [ mode MODE ] [ reqid REQID ]\n");
83 //fprintf(stderr, "REQID - number(default=0)\n");
263 } else if (strcmp(*argv, "reqid") == 0) {
265 xfrm_reqid_parse(&req.xsinfo.reqid, &argc, &argv);
541 } else if (strcmp(*argv, "reqid") == 0)
    [all...]
xfrm_monitor.c 242 fprintf(fp, " reqid 0x%x", id->reqid);
xfrm_policy.c 85 fprintf(stderr, "TMPL := ID [ mode MODE ] [ reqid REQID ] [ level LEVEL ]\n");
97 //fprintf(stderr, "REQID - number(default=0)\n");
185 } else if (strcmp(*argv, "reqid") == 0) {
187 xfrm_reqid_parse(&tmpl->reqid, &argc, &argv);
  /external/ipsec-tools/src/racoon/
policy.h 94 u_int32_t reqid; /* reqid id who owned this SA */ member in struct:secasindex
backupsa.c 76 * src dst satype spi mode reqid wsize \
153 sa_args->mode, sa_args->reqid, sa_args->wsize, sa_args->e_type,
271 GETNEXTNUM(sa_args.reqid, strtoul);
proposal.c 950 "encmode=%s reqid=%d:%d)\n",
1119 newpr->reqid_out = req->saidx.reqid;
1121 newpr->reqid_in = req->saidx.reqid;
1142 pr->reqid_in = req->saidx.reqid;
1144 pr->reqid_out = req->saidx.reqid;
1254 * risk of reusing the same reqid
pfkey.c 1127 sa_args.reqid = pr->reqid_in;
    [all...]
  /external/ipsec-tools/src/libipsec/
pfkey.c 377 pfkey_send_getspi(so, satype, mode, src, dst, min, max, reqid, seq)
381 u_int32_t min, max, reqid, seq;
441 p = pfkey_setsadbxsa2(p, ep, mode, reqid);
1358 p = pfkey_setsadbxsa2(p, ep, sa_parms->mode, sa_parms->reqid);
    [all...]
libpfkey.h 75 u_int32_t reqid; member in struct:pfkey_send_sa_args

Completed in 722 milliseconds