/external/iptables/include/linux/netfilter/ |
xt_policy.h | 26 reqid:1; member in struct:xt_policy_spec 55 __u32 reqid; member in struct:xt_policy_elem
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/netfilter/ |
xt_policy.h | 27 reqid:1; member in struct:xt_policy_spec 43 u_int32_t reqid; member in struct:xt_policy_elem
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/netfilter/ |
xt_policy.h | 27 reqid:1; member in struct:xt_policy_spec 43 u_int32_t reqid; member in struct:xt_policy_elem
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/netfilter/ |
xt_policy.h | 27 reqid:1; member in struct:xt_policy_spec 43 u_int32_t reqid; member in struct:xt_policy_elem
|
/external/iptables/extensions/ |
libxt_policy.c | 33 "[!] --reqid reqid match reqid\n" 47 {.name = "reqid", .id = O_REQID, .type = XTTYPE_UINT32, 108 if (e->match.reqid) 110 "policy match: double --reqid option"); 111 e->match.reqid = 1; 112 e->invert.reqid = cb->invert; 113 e->reqid = cb->val.u32; 208 !(e->match.reqid || e->match.spi || e->match.saddr | [all...] |
/external/ppp/pppd/ |
fsm.h | 72 u_char reqid; /* Current request id */ member in struct:fsm
|
fsm.c | 222 fsm_sdata(f, TERMREQ, f->reqid = ++f->id, 298 fsm_sdata(f, TERMREQ, f->reqid = ++f->id, 490 if (id != f->reqid || f->seen_ack) /* Expected id? */ 551 if (id != f->reqid || f->seen_ack) /* Expected id? */ 763 f->reqid = ++f->id; 782 fsm_sdata(f, CONFREQ, f->reqid, outp, cilen);
|
ccp.c | 494 if (ccp_localstate[f->unit] & RACK_PENDING && id == f->reqid) { [all...] |
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
xfrm.h | 215 __u32 reqid; member in struct:xfrm_user_tmpl 322 __u32 reqid; member in struct:xfrm_usersa_info 344 __u32 reqid; member in struct:xfrm_aevent_id 412 __u32 reqid; member in struct:xfrm_user_migrate
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
xfrm.h | 215 __u32 reqid; member in struct:xfrm_user_tmpl 322 __u32 reqid; member in struct:xfrm_usersa_info 344 __u32 reqid; member in struct:xfrm_aevent_id 412 __u32 reqid; member in struct:xfrm_user_migrate
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
xfrm.h | 215 __u32 reqid; member in struct:xfrm_user_tmpl 322 __u32 reqid; member in struct:xfrm_usersa_info 344 __u32 reqid; member in struct:xfrm_aevent_id 412 __u32 reqid; member in struct:xfrm_user_migrate
|
/external/iproute2/include/linux/ |
xfrm.h | 235 __u32 reqid; member in struct:xfrm_user_tmpl 353 __u32 reqid; member in struct:xfrm_usersa_info 379 __u32 reqid; member in struct:xfrm_aevent_id 458 __u32 reqid; member in struct:xfrm_user_migrate 465 __u32 reqid; member in struct:xfrm_user_mapping
|
/external/iproute2/ip/ |
xfrm.h | 133 __u8 mode, __u32 reqid, __u16 family, int force_spi, 153 int xfrm_reqid_parse(__u32 *reqid, int *argcp, char ***argvp);
|
xfrm_monitor.c | 225 static void xfrm_usersa_print(const struct xfrm_usersa_id *sa_id, __u32 reqid, FILE *fp) 233 fprintf(fp, " reqid 0x%x", reqid); 254 xfrm_usersa_print(&id->sa_id, id->reqid, fp); 285 xfrm_usersa_print(&map->id, map->reqid, fp);
|
ipxfrm.c | 284 __u8 mode, __u32 reqid, __u16 family, int force_spi, 314 fprintf(fp, "reqid %u", reqid); 316 fprintf(fp, "(0x%08x)", reqid); 617 tmpl->reqid, tmpl->family, 0, fp, prefix, "tmpl "); 839 xsinfo->reqid, xsinfo->family, force_spi, fp, 1130 /* NOTE: reqid is used by host-byte order */ 1131 int xfrm_reqid_parse(__u32 *reqid, int *argcp, char ***argvp) 1136 if (get_u32(reqid, *argv, 0)) 1137 invarg("\"REQID\" is invalid", *argv) [all...] |
xfrm_state.c | 64 fprintf(stderr, " [ mark MARK [ mask MASK ] ] [ reqid REQID ] [ seq SEQ ]\n"); 69 fprintf(stderr, " [ reqid REQID ] [ seq SEQ ] [ min SPI max SPI ]\n"); 71 fprintf(stderr, "Usage: ip xfrm state { deleteall | list } [ ID ] [ mode MODE ] [ reqid REQID ]\n"); 278 } else if (strcmp(*argv, "reqid") == 0) { 280 xfrm_reqid_parse(&req.xsinfo.reqid, &argc, &argv); 596 } else if (strcmp(*argv, "reqid") == 0) { 598 xfrm_reqid_parse(&req.xspi.info.reqid, &argc, &argv) [all...] |
/external/ipsec-tools/src/racoon/ |
policy.h | 94 u_int32_t reqid; /* reqid id who owned this SA */ member in struct:secasindex
|
backupsa.c | 76 * src dst satype spi mode reqid wsize \ 153 sa_args->mode, sa_args->reqid, sa_args->wsize, sa_args->e_type, 271 GETNEXTNUM(sa_args.reqid, strtoul);
|
proposal.c | 950 "encmode=%s reqid=%d:%d)\n", 1119 newpr->reqid_out = req->saidx.reqid; 1121 newpr->reqid_in = req->saidx.reqid; 1142 pr->reqid_in = req->saidx.reqid; 1144 pr->reqid_out = req->saidx.reqid; 1254 * risk of reusing the same reqid
|
/external/libppp/src/ |
fsm.h | 108 u_char reqid; /* Next request id */ member in struct:fsm
|
fsm.c | 152 fp->reqid = 1; 400 fsm_Output(fp, CODE_TERMREQ, fp->reqid, NULL, 0, MB_UNKNOWN); 1080 if (lh.id != fp->reqid && codep->check_reqid && 1083 fp->link->name, codep->name, lh.id, fp->reqid); 1090 if (codep->inc_reqid && (lh.id == fp->reqid || 1092 fp->reqid++; /* That's the end of that ``exchange''.... */
|
mppe.c | 315 fsm_Output(&ccp->fsm, CODE_RESETREQ, ccp->fsm.reqid++, NULL, 0, 330 fsm_Output(&ccp->fsm, CODE_RESETREQ, ccp->fsm.reqid++, NULL, 0,
|
ccp.c | 395 fsm_Output(fp, CODE_CONFIGREQ, fp->reqid, buff, cp - buff, MB_CCPOUT); 404 ccp->reset_sent = fp->reqid; 406 fsm_Output(fp, CODE_RESETREQ, fp->reqid, NULL, 0, MB_CCPOUT);
|
/external/ipsec-tools/src/libipsec/ |
pfkey.c | 377 pfkey_send_getspi(so, satype, mode, src, dst, min, max, reqid, seq) 381 u_int32_t min, max, reqid, seq; 441 p = pfkey_setsadbxsa2(p, ep, mode, reqid); 1358 p = pfkey_setsadbxsa2(p, ep, sa_parms->mode, sa_parms->reqid); [all...] |
libpfkey.h | 75 u_int32_t reqid; member in struct:pfkey_send_sa_args
|