/external/iptables/include/linux/netfilter/ |
H A D | xt_policy.h | 26 reqid:1; member in struct:xt_policy_spec 44 __u32 reqid; member in struct:xt_policy_elem
|
/external/kernel-headers/original/uapi/linux/netfilter/ |
H A D | xt_policy.h | 26 reqid:1; member in struct:xt_policy_spec 55 __u32 reqid; member in struct:xt_policy_elem
|
/external/iptables/extensions/ |
H A D | libxt_policy.c | 37 "[!] --reqid reqid match reqid\n" 50 {.name = "reqid", .id = O_REQID, .type = XTTYPE_UINT32, 111 if (e->match.reqid) 113 "policy match: double --reqid option"); 114 e->match.reqid = 1; 115 e->invert.reqid = cb->invert; 116 e->reqid = cb->val.u32; 211 !(e->match.reqid || [all...] |
/external/ppp/pppd/ |
H A D | fsm.h | 72 u_char reqid; /* Current request id */ member in struct:fsm
|
H A D | fsm.c | 222 fsm_sdata(f, TERMREQ, f->reqid = ++f->id, 298 fsm_sdata(f, TERMREQ, f->reqid = ++f->id, 490 if (id != f->reqid || f->seen_ack) /* Expected id? */ 551 if (id != f->reqid || f->seen_ack) /* Expected id? */ 763 f->reqid = ++f->id; 782 fsm_sdata(f, CONFREQ, f->reqid, outp, cilen);
|
H A D | ccp.c | 494 if (ccp_localstate[f->unit] & RACK_PENDING && id == f->reqid) { 1649 fsm_sdata(f, CCP_RESETREQ, f->reqid = ++f->id, NULL, 0); 1668 fsm_sdata(f, CCP_RESETREQ, f->reqid, NULL, 0);
|
/external/iproute2/include/linux/ |
H A D | xfrm.h | 235 __u32 reqid; member in struct:xfrm_user_tmpl 353 __u32 reqid; member in struct:xfrm_usersa_info 379 __u32 reqid; member in struct:xfrm_aevent_id 458 __u32 reqid; member in struct:xfrm_user_migrate 465 __u32 reqid; member in struct:xfrm_user_mapping
|
/external/kernel-headers/original/uapi/linux/ |
H A D | xfrm.h | 237 __u32 reqid; member in struct:xfrm_user_tmpl 356 __u32 reqid; member in struct:xfrm_usersa_info 384 __u32 reqid; member in struct:xfrm_aevent_id 463 __u32 reqid; member in struct:xfrm_user_migrate 470 __u32 reqid; member in struct:xfrm_user_mapping
|
/external/iproute2/ip/ |
H A D | xfrm.h | 133 __u8 mode, __u32 reqid, __u16 family, int force_spi, 153 int xfrm_reqid_parse(__u32 *reqid, int *argcp, char ***argvp);
|
H A D | xfrm_monitor.c | 225 static void xfrm_usersa_print(const struct xfrm_usersa_id *sa_id, __u32 reqid, FILE *fp) argument 233 fprintf(fp, " reqid 0x%x", reqid); 254 xfrm_usersa_print(&id->sa_id, id->reqid, fp); 285 xfrm_usersa_print(&map->id, map->reqid, fp);
|
H A D | ipxfrm.c | 284 __u8 mode, __u32 reqid, __u16 family, int force_spi, 314 fprintf(fp, "reqid %u", reqid); 316 fprintf(fp, "(0x%08x)", reqid); 617 tmpl->reqid, tmpl->family, 0, fp, prefix, "tmpl "); 839 xsinfo->reqid, xsinfo->family, force_spi, fp, 1130 /* NOTE: reqid is used by host-byte order */ 1131 int xfrm_reqid_parse(__u32 *reqid, int *argcp, char ***argvp) argument 1136 if (get_u32(reqid, *argv, 0)) 283 xfrm_id_info_print(xfrm_address_t *saddr, struct xfrm_id *id, __u8 mode, __u32 reqid, __u16 family, int force_spi, FILE *fp, const char *prefix, const char *title) argument
|
H A D | xfrm_state.c | 64 fprintf(stderr, " [ mark MARK [ mask MASK ] ] [ reqid REQID ] [ seq SEQ ]\n"); 69 fprintf(stderr, " [ reqid REQID ] [ seq SEQ ] [ min SPI max SPI ]\n"); 71 fprintf(stderr, "Usage: ip xfrm state { deleteall | list } [ ID ] [ mode MODE ] [ reqid REQID ]\n"); 278 } else if (strcmp(*argv, "reqid") == 0) { 280 xfrm_reqid_parse(&req.xsinfo.reqid, &argc, &argv); 596 } else if (strcmp(*argv, "reqid") == 0) { 598 xfrm_reqid_parse(&req.xspi.info.reqid, &argc, &argv); 720 if ((xsinfo->reqid^filter.xsinfo.reqid)&filter.reqid_mask) 972 } else if (strcmp(*argv, "reqid") [all...] |
H A D | xfrm_policy.c | 94 fprintf(stderr, "TMPL := ID [ mode MODE ] [ reqid REQID ] [ level LEVEL ]\n"); 192 } else if (strcmp(*argv, "reqid") == 0) { 194 xfrm_reqid_parse(&tmpl->reqid, &argc, &argv);
|
/external/ipsec-tools/src/racoon/ |
H A D | policy.h | 94 u_int32_t reqid; /* reqid id who owned this SA */ member in struct:secasindex
|
H A D | backupsa.c | 76 * src dst satype spi mode reqid wsize \ 153 sa_args->mode, sa_args->reqid, sa_args->wsize, sa_args->e_type, 271 GETNEXTNUM(sa_args.reqid, strtoul);
|
H A D | proposal.c | 950 "encmode=%s reqid=%d:%d)\n", 1119 newpr->reqid_out = req->saidx.reqid; 1121 newpr->reqid_in = req->saidx.reqid; 1142 pr->reqid_in = req->saidx.reqid; 1144 pr->reqid_out = req->saidx.reqid; 1254 * risk of reusing the same reqid
|
H A D | pfkey.c | 1127 sa_args.reqid = pr->reqid_in; 1423 sa_args.reqid = pr->reqid_out; 3011 (*p_isr)->saidx.reqid =
|
/external/ipsec-tools/src/libipsec/ |
H A D | pfkey.c | 377 pfkey_send_getspi(so, satype, mode, src, dst, min, max, reqid, seq) 381 u_int32_t min, max, reqid, seq; 441 p = pfkey_setsadbxsa2(p, ep, mode, reqid); 1358 p = pfkey_setsadbxsa2(p, ep, sa_parms->mode, sa_parms->reqid); 2342 pfkey_setsadbxsa2(buf, lim, mode0, reqid) 2346 u_int32_t reqid; 2362 p->sadb_x_sa2_reqid = reqid; 2480 pfkey_send_update(so, satype, mode, src, dst, spi, reqid, wsize, 2486 u_int32_t spi, reqid; 2504 psaa.reqid [all...] |
H A D | libpfkey.h | 75 u_int32_t reqid; member in struct:pfkey_send_sa_args
|