/external/ipsec-tools/src/libipsec/ |
test-policy.c | 230 int spid; local 283 spid = test2sub(so); 285 printf("spdget(%u)\n", spid); 286 if (pfkey_send_spdget(so, spid) < 0) 295 if (pfkey_send_spddelete2(so, spid) < 0) 305 spid = test2sub(so);
|
/external/dhcpcd/ |
common.c | 216 char spid[16]; local 221 snprintf(spid, sizeof(spid), "%u\n", pid); 222 len = pwrite(fd, spid, strlen(spid), (off_t)0); 223 if (len != (ssize_t)strlen(spid))
|
/external/dbus/bus/ |
selinux.c | 481 unsigned long spid; local 489 if (!dbus_connection_get_unix_process_id (connection, &spid)) 490 spid = 0; 501 if (spid) 503 if (!_dbus_string_append (&auxdata, " spid=")) 506 if (!_dbus_string_append_uint (&auxdata, spid)) 552 unsigned long spid, tpid; local 560 if (!sender || !dbus_connection_get_unix_process_id (sender, &spid)) 561 spid = 0; 608 if (spid) [all...] |
/external/ipsec-tools/src/racoon/ |
handler.h | 257 u_int32_t spid; /* policy id by kernel */ member in struct:ph2handle
|