/external/iptables/include/linux/netfilter/ |
H A D | xt_policy.h | 26 reqid:1; member in struct:xt_policy_spec 44 __u32 reqid; member in struct:xt_policy_elem
|
/external/kernel-headers/original/uapi/linux/netfilter/ |
H A D | xt_policy.h | 26 reqid:1; member in struct:xt_policy_spec 55 __u32 reqid; member in struct:xt_policy_elem
|
/external/iptables/extensions/ |
H A D | libxt_policy.c | 37 "[!] --reqid reqid match reqid\n" 50 {.name = "reqid", .id = O_REQID, .type = XTTYPE_UINT32, 111 if (e->match.reqid) 113 "policy match: double --reqid option"); 114 e->match.reqid = 1; 115 e->invert.reqid = cb->invert; 116 e->reqid = cb->val.u32; 211 !(e->match.reqid || [all...] |
/external/ppp/pppd/ |
H A D | fsm.h | 72 u_char reqid; /* Current request id */ member in struct:fsm
|
H A D | fsm.c | 222 fsm_sdata(f, TERMREQ, f->reqid = ++f->id, 298 fsm_sdata(f, TERMREQ, f->reqid = ++f->id, 490 if (id != f->reqid || f->seen_ack) /* Expected id? */ 551 if (id != f->reqid || f->seen_ack) /* Expected id? */ 763 f->reqid = ++f->id; 782 fsm_sdata(f, CONFREQ, f->reqid, outp, cilen);
|
H A D | ccp.c | 494 if (ccp_localstate[f->unit] & RACK_PENDING && id == f->reqid) { 1653 fsm_sdata(f, CCP_RESETREQ, f->reqid = ++f->id, NULL, 0); 1672 fsm_sdata(f, CCP_RESETREQ, f->reqid, NULL, 0);
|
/external/iproute2/include/linux/ |
H A D | xfrm.h | 239 __u32 reqid; member in struct:xfrm_user_tmpl 367 __u32 reqid; member in struct:xfrm_usersa_info 395 __u32 reqid; member in struct:xfrm_aevent_id 474 __u32 reqid; member in struct:xfrm_user_migrate 481 __u32 reqid; member in struct:xfrm_user_mapping
|
/external/kernel-headers/original/uapi/linux/ |
H A D | xfrm.h | 239 __u32 reqid; member in struct:xfrm_user_tmpl 367 __u32 reqid; member in struct:xfrm_usersa_info 395 __u32 reqid; member in struct:xfrm_aevent_id 474 __u32 reqid; member in struct:xfrm_user_migrate 481 __u32 reqid; member in struct:xfrm_user_mapping
|
/external/iproute2/ip/ |
H A D | xfrm.h | 132 __u8 mode, __u32 reqid, __u16 family, int force_spi, 152 int xfrm_reqid_parse(__u32 *reqid, int *argcp, char ***argvp);
|
H A D | xfrm_monitor.c | 226 static void xfrm_usersa_print(const struct xfrm_usersa_id *sa_id, __u32 reqid, FILE *fp) argument 235 fprintf(fp, " reqid 0x%x", reqid); 256 xfrm_usersa_print(&id->sa_id, id->reqid, fp); 285 xfrm_usersa_print(&map->id, map->reqid, fp);
|
H A D | ipxfrm.c | 281 __u8 mode, __u32 reqid, __u16 family, int force_spi, 311 fprintf(fp, "reqid %u", reqid); 313 fprintf(fp, "(0x%08x)", reqid); 612 tmpl->reqid, tmpl->family, 0, fp, prefix, "tmpl "); 891 xsinfo->reqid, xsinfo->family, force_spi, fp, 1205 /* NOTE: reqid is used by host-byte order */ 1206 int xfrm_reqid_parse(__u32 *reqid, int *argcp, char ***argvp) argument 1211 if (get_u32(reqid, *argv, 0)) 280 xfrm_id_info_print(xfrm_address_t *saddr, struct xfrm_id *id, __u8 mode, __u32 reqid, __u16 family, int force_spi, FILE *fp, const char *prefix, const char *title) argument
|
H A D | xfrm_state.c | 58 fprintf(stderr, " [ mark MARK [ mask MASK ] ] [ reqid REQID ] [ seq SEQ ]\n"); 64 fprintf(stderr, " [ reqid REQID ] [ seq SEQ ] [ min SPI max SPI ]\n"); 66 fprintf(stderr, "Usage: ip xfrm state { deleteall | list } [ ID ] [ mode MODE ] [ reqid REQID ]\n"); 316 } else if (strcmp(*argv, "reqid") == 0) { 318 xfrm_reqid_parse(&req.xsinfo.reqid, &argc, &argv); 735 } else if (strcmp(*argv, "reqid") == 0) { 737 xfrm_reqid_parse(&req.xspi.info.reqid, &argc, &argv); 859 if ((xsinfo->reqid^filter.xsinfo.reqid)&filter.reqid_mask) 1111 } else if (strcmp(*argv, "reqid") [all...] |
H A D | xfrm_policy.c | 90 fprintf(stderr, "TMPL := ID [ mode MODE ] [ reqid REQID ] [ level LEVEL ]\n"); 188 } else if (strcmp(*argv, "reqid") == 0) { 190 xfrm_reqid_parse(&tmpl->reqid, &argc, &argv);
|
/external/ipsec-tools/src/libipsec/ |
H A D | pfkey.c | 378 struct sockaddr *dst, u_int32_t min, u_int32_t max, u_int32_t reqid, 439 p = pfkey_setsadbxsa2(p, ep, mode, reqid); 1296 p = pfkey_setsadbxsa2(p, ep, sa_parms->mode, sa_parms->reqid); 2239 pfkey_setsadbxsa2(caddr_t buf, caddr_t lim, u_int32_t mode0, u_int32_t reqid) argument 2255 p->sadb_x_sa2_reqid = reqid; 2358 struct sockaddr *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, 2374 psaa.reqid = reqid; 2392 struct sockaddr *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, 2410 psaa.reqid 377 pfkey_send_getspi(int so, u_int satype, u_int mode, struct sockaddr *src, struct sockaddr *dst, u_int32_t min, u_int32_t max, u_int32_t reqid, u_int32_t seq) argument 2357 pfkey_send_update(int so, u_int satype, u_int mode, struct sockaddr *src, struct sockaddr *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, caddr_t keymat, u_int e_type, u_int e_keylen, u_int a_type, u_int a_keylen, u_int flags, u_int32_t l_alloc, u_int64_t l_bytes, u_int64_t l_addtime, u_int64_t l_usetime, u_int32_t seq) argument 2391 pfkey_send_update_nat(int so, u_int satype, u_int mode, struct sockaddr *src, struct sockaddr *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, caddr_t keymat, u_int e_type, u_int e_keylen, u_int a_type, u_int a_keylen, u_int flags, u_int32_t l_alloc, u_int64_t l_bytes, u_int64_t l_addtime, u_int64_t l_usetime, u_int32_t seq, u_int8_t l_natt_type, u_int16_t l_natt_sport, u_int16_t l_natt_dport, struct sockaddr *l_natt_oa, u_int16_t l_natt_frag) argument 2432 pfkey_send_add(int so, u_int satype, u_int mode, struct sockaddr *src, struct sockaddr *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, caddr_t keymat, u_int e_type, u_int e_keylen, u_int a_type, u_int a_keylen, u_int flags, u_int32_t l_alloc, u_int64_t l_bytes, u_int64_t l_addtime, u_int64_t l_usetime, u_int32_t seq) argument 2466 pfkey_send_add_nat(int so, u_int satype, u_int mode, struct sockaddr *src, struct sockaddr *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, caddr_t keymat, u_int e_type, u_int e_keylen, u_int a_type, u_int a_keylen, u_int flags, u_int32_t l_alloc, u_int64_t l_bytes, u_int64_t l_addtime, u_int64_t l_usetime, u_int32_t seq, u_int8_t l_natt_type, u_int16_t l_natt_sport, u_int16_t l_natt_dport, struct sockaddr *l_natt_oa, u_int16_t l_natt_frag) argument [all...] |
H A D | libpfkey.h | 75 u_int32_t reqid; member in struct:pfkey_send_sa_args
|
/external/ipsec-tools/src/racoon/ |
H A D | policy.h | 94 u_int32_t reqid; /* reqid id who owned this SA */ member in struct:secasindex
|
H A D | backupsa.c | 76 * src dst satype spi mode reqid wsize \ 153 sa_args->mode, sa_args->reqid, sa_args->wsize, sa_args->e_type, 271 GETNEXTNUM(sa_args.reqid, strtoul);
|
H A D | proposal.c | 950 "encmode=%s reqid=%d:%d)\n", 1119 newpr->reqid_out = req->saidx.reqid; 1121 newpr->reqid_in = req->saidx.reqid; 1142 pr->reqid_in = req->saidx.reqid; 1144 pr->reqid_out = req->saidx.reqid; 1254 * risk of reusing the same reqid
|
H A D | pfkey.c | 1127 sa_args.reqid = pr->reqid_in; 1423 sa_args.reqid = pr->reqid_out; 3011 (*p_isr)->saidx.reqid =
|