/external/iptables/include/linux/netfilter/ |
H A D | xt_policy.h | 26 reqid:1; member in struct:xt_policy_spec 55 __u32 reqid; member in struct:xt_policy_elem
|
/external/iptables/extensions/ |
H A D | libxt_policy.c | 33 "[!] --reqid reqid match reqid\n" 47 {.name = "reqid", .id = O_REQID, .type = XTTYPE_UINT32, 108 if (e->match.reqid) 110 "policy match: double --reqid option"); 111 e->match.reqid = 1; 112 e->invert.reqid = cb->invert; 113 e->reqid = cb->val.u32; 208 !(e->match.reqid || [all...] |
/external/ppp/pppd/ |
H A D | fsm.h | 72 u_char reqid; /* Current request id */ member in struct:fsm
|
H A D | fsm.c | 222 fsm_sdata(f, TERMREQ, f->reqid = ++f->id, 298 fsm_sdata(f, TERMREQ, f->reqid = ++f->id, 490 if (id != f->reqid || f->seen_ack) /* Expected id? */ 551 if (id != f->reqid || f->seen_ack) /* Expected id? */ 763 f->reqid = ++f->id; 782 fsm_sdata(f, CONFREQ, f->reqid, outp, cilen);
|
H A D | ccp.c | 494 if (ccp_localstate[f->unit] & RACK_PENDING && id == f->reqid) { 1649 fsm_sdata(f, CCP_RESETREQ, f->reqid = ++f->id, NULL, 0); 1668 fsm_sdata(f, CCP_RESETREQ, f->reqid, NULL, 0);
|
/external/iproute2/include/linux/ |
H A D | xfrm.h | 225 __u32 reqid; member in struct:xfrm_user_tmpl 341 __u32 reqid; member in struct:xfrm_usersa_info 365 __u32 reqid; member in struct:xfrm_aevent_id 444 __u32 reqid; member in struct:xfrm_user_migrate 451 __u32 reqid; member in struct:xfrm_user_mapping
|
/external/iproute2/ip/ |
H A D | xfrm.h | 133 __u8 mode, __u32 reqid, __u16 family, int force_spi, 153 int xfrm_reqid_parse(__u32 *reqid, int *argcp, char ***argvp);
|
H A D | ipxfrm.c | 283 __u8 mode, __u32 reqid, __u16 family, int force_spi, 313 fprintf(fp, "reqid %u", reqid); 315 fprintf(fp, "(0x%08x)", reqid); 591 tmpl->reqid, tmpl->family, 0, fp, prefix, "tmpl "); 807 xsinfo->reqid, xsinfo->family, force_spi, fp, 1063 /* NOTE: reqid is used by host-byte order */ 1064 int xfrm_reqid_parse(__u32 *reqid, int *argcp, char ***argvp) argument 1069 if (get_u32(reqid, *argv, 0)) 282 xfrm_id_info_print(xfrm_address_t *saddr, struct xfrm_id *id, __u8 mode, __u32 reqid, __u16 family, int force_spi, FILE *fp, const char *prefix, const char *title) argument
|
H A D | xfrm_state.c | 62 fprintf(stderr, " [ reqid REQID ] [ seq SEQ ] [ replay-window SIZE ] [ flag FLAG-LIST ]\n"); 65 fprintf(stderr, "Usage: ip xfrm state allocspi ID [ mode MODE ] [ reqid REQID ] [ seq SEQ ]\n"); 68 fprintf(stderr, "Usage: ip xfrm state { deleteall | list } [ ID ] [ mode MODE ] [ reqid REQID ]\n"); 273 } else if (strcmp(*argv, "reqid") == 0) { 275 xfrm_reqid_parse(&req.xsinfo.reqid, &argc, &argv); 563 } else if (strcmp(*argv, "reqid") == 0) { 565 xfrm_reqid_parse(&req.xspi.info.reqid, &argc, &argv); 687 if ((xsinfo->reqid^filter.xsinfo.reqid)&filter.reqid_mask) 939 } else if (strcmp(*argv, "reqid") [all...] |
H A D | xfrm_monitor.c | 243 fprintf(fp, " reqid 0x%x", id->reqid);
|
H A D | xfrm_policy.c | 87 fprintf(stderr, "TMPL := ID [ mode MODE ] [ reqid REQID ] [ level LEVEL ]\n"); 187 } else if (strcmp(*argv, "reqid") == 0) { 189 xfrm_reqid_parse(&tmpl->reqid, &argc, &argv);
|
/external/ipsec-tools/src/racoon/ |
H A D | policy.h | 94 u_int32_t reqid; /* reqid id who owned this SA */ member in struct:secasindex
|
H A D | backupsa.c | 76 * src dst satype spi mode reqid wsize \ 153 sa_args->mode, sa_args->reqid, sa_args->wsize, sa_args->e_type, 271 GETNEXTNUM(sa_args.reqid, strtoul);
|
H A D | proposal.c | 950 "encmode=%s reqid=%d:%d)\n", 1119 newpr->reqid_out = req->saidx.reqid; 1121 newpr->reqid_in = req->saidx.reqid; 1142 pr->reqid_in = req->saidx.reqid; 1144 pr->reqid_out = req->saidx.reqid; 1254 * risk of reusing the same reqid
|
H A D | pfkey.c | 1127 sa_args.reqid = pr->reqid_in; 1423 sa_args.reqid = pr->reqid_out; 3011 (*p_isr)->saidx.reqid =
|
/external/libppp/src/ |
H A D | fsm.h | 108 u_char reqid; /* Next request id */ member in struct:fsm
|
H A D | fsm.c | 152 fp->reqid = 1; 400 fsm_Output(fp, CODE_TERMREQ, fp->reqid, NULL, 0, MB_UNKNOWN); 1080 if (lh.id != fp->reqid && codep->check_reqid && 1083 fp->link->name, codep->name, lh.id, fp->reqid); 1090 if (codep->inc_reqid && (lh.id == fp->reqid || 1092 fp->reqid++; /* That's the end of that ``exchange''.... */
|
H A D | mppe.c | 315 fsm_Output(&ccp->fsm, CODE_RESETREQ, ccp->fsm.reqid++, NULL, 0, 330 fsm_Output(&ccp->fsm, CODE_RESETREQ, ccp->fsm.reqid++, NULL, 0,
|
H A D | ccp.c | 395 fsm_Output(fp, CODE_CONFIGREQ, fp->reqid, buff, cp - buff, MB_CCPOUT); 404 ccp->reset_sent = fp->reqid; 406 fsm_Output(fp, CODE_RESETREQ, fp->reqid, NULL, 0, MB_CCPOUT);
|
H A D | lcp.c | 487 fsm_Output(fp, CODE_CONFIGREQ, fp->reqid, buff, (u_char *)o - buff, 495 fsm_Output(&lcp->fsm, CODE_PROTOREJ, lcp->fsm.reqid, option, count,
|
H A D | ipv6cp.c | 631 fsm_Output(fp, CODE_CONFIGREQ, fp->reqid, buff, (u_char *)o - buff,
|
H A D | ipcp.c | 796 fsm_Output(fp, CODE_CONFIGREQ, fp->reqid, buff, (u_char *)o - buff,
|
/external/ipsec-tools/src/libipsec/ |
H A D | pfkey.c | 377 pfkey_send_getspi(so, satype, mode, src, dst, min, max, reqid, seq) 381 u_int32_t min, max, reqid, seq; 441 p = pfkey_setsadbxsa2(p, ep, mode, reqid); 1358 p = pfkey_setsadbxsa2(p, ep, sa_parms->mode, sa_parms->reqid); 2342 pfkey_setsadbxsa2(buf, lim, mode0, reqid) 2346 u_int32_t reqid; 2362 p->sadb_x_sa2_reqid = reqid; 2480 pfkey_send_update(so, satype, mode, src, dst, spi, reqid, wsize, 2486 u_int32_t spi, reqid; 2504 psaa.reqid [all...] |
H A D | libpfkey.h | 75 u_int32_t reqid; member in struct:pfkey_send_sa_args
|