/prebuilts/ndk/current/platforms/android-24/arch-x86_64/usr/include/linux/ |
xfrm.h | 242 __u32 reqid; member in struct:xfrm_user_tmpl 370 __u32 reqid; member in struct:xfrm_usersa_info 401 __u32 reqid; member in struct:xfrm_aevent_id 484 __u32 reqid; member in struct:xfrm_user_migrate 491 __u32 reqid; member in struct:xfrm_user_mapping
|
/external/iproute2/ip/ |
xfrm.h | 132 __u8 mode, __u32 reqid, __u16 family, int force_spi, 152 int xfrm_reqid_parse(__u32 *reqid, int *argcp, char ***argvp);
|
xfrm_monitor.c | 226 static void xfrm_usersa_print(const struct xfrm_usersa_id *sa_id, __u32 reqid, FILE *fp) 235 fprintf(fp, " reqid 0x%x", reqid); 256 xfrm_usersa_print(&id->sa_id, id->reqid, fp); 285 xfrm_usersa_print(&map->id, map->reqid, fp);
|
ipxfrm.c | 281 __u8 mode, __u32 reqid, __u16 family, int force_spi, 311 fprintf(fp, "reqid %u", reqid); 313 fprintf(fp, "(0x%08x)", reqid); 612 tmpl->reqid, tmpl->family, 0, fp, prefix, "tmpl "); 891 xsinfo->reqid, xsinfo->family, force_spi, fp, 1205 /* NOTE: reqid is used by host-byte order */ 1206 int xfrm_reqid_parse(__u32 *reqid, int *argcp, char ***argvp) 1211 if (get_u32(reqid, *argv, 0)) 1212 invarg("REQID value is invalid", *argv) [all...] |
xfrm_state.c | 58 fprintf(stderr, " [ mark MARK [ mask MASK ] ] [ reqid REQID ] [ seq SEQ ]\n"); 64 fprintf(stderr, " [ reqid REQID ] [ seq SEQ ] [ min SPI max SPI ]\n"); 66 fprintf(stderr, "Usage: ip xfrm state { deleteall | list } [ ID ] [ mode MODE ] [ reqid REQID ]\n"); 316 } else if (strcmp(*argv, "reqid") == 0) { 318 xfrm_reqid_parse(&req.xsinfo.reqid, &argc, &argv); 735 } else if (strcmp(*argv, "reqid") == 0) { 737 xfrm_reqid_parse(&req.xspi.info.reqid, &argc, &argv) [all...] |
xfrm_policy.c | 90 fprintf(stderr, "TMPL := ID [ mode MODE ] [ reqid REQID ] [ level LEVEL ]\n"); 188 } else if (strcmp(*argv, "reqid") == 0) { 190 xfrm_reqid_parse(&tmpl->reqid, &argc, &argv);
|
/hardware/qcom/wlan/qcwcn/wifi_hal/ |
llstatscommand.h | 98 virtual void initGetContext(u32 reqid);
|
rssi_monitor.cpp | 125 void RSSIMonitorCommand::setReqId(wifi_request_id reqid) 127 mId = reqid; 189 wifi_request_id reqId; 206 reqId = nla_get_u32( 212 if (reqId != id()) { 214 __FUNCTION__, reqId, id()); 215 reqId = id(); 236 (*mHandler.on_rssi_threshold_breached)(reqId, addr, rssi);
|
/external/ipsec-tools/src/libipsec/ |
pfkey.c | 378 struct sockaddr *dst, u_int32_t min, u_int32_t max, u_int32_t reqid, 439 p = pfkey_setsadbxsa2(p, ep, mode, reqid); 1296 p = pfkey_setsadbxsa2(p, ep, sa_parms->mode, sa_parms->reqid); [all...] |
libpfkey.h | 75 u_int32_t reqid; member in struct:pfkey_send_sa_args
|
/external/ppp/pppd/ |
fsm.c | 222 fsm_sdata(f, TERMREQ, f->reqid = ++f->id, 298 fsm_sdata(f, TERMREQ, f->reqid = ++f->id, 490 if (id != f->reqid || f->seen_ack) /* Expected id? */ 551 if (id != f->reqid || f->seen_ack) /* Expected id? */ 763 f->reqid = ++f->id; 782 fsm_sdata(f, CONFREQ, f->reqid, outp, cilen);
|
ccp.c | 494 if (ccp_localstate[f->unit] & RACK_PENDING && id == f->reqid) { [all...] |
/external/ipsec-tools/src/racoon/ |
policy.h | 94 u_int32_t reqid; /* reqid id who owned this SA */ member in struct:secasindex
|
backupsa.c | 76 * src dst satype spi mode reqid wsize \ 153 sa_args->mode, sa_args->reqid, sa_args->wsize, sa_args->e_type, 271 GETNEXTNUM(sa_args.reqid, strtoul);
|
proposal.c | 950 "encmode=%s reqid=%d:%d)\n", 1119 newpr->reqid_out = req->saidx.reqid; 1121 newpr->reqid_in = req->saidx.reqid; 1142 pr->reqid_in = req->saidx.reqid; 1144 pr->reqid_out = req->saidx.reqid; 1254 * risk of reusing the same reqid
|
pfkey.c | 1127 sa_args.reqid = pr->reqid_in; [all...] |