/external/iptables/extensions/ |
D | libxt_policy.c | 111 if (e->match.reqid) in policy_parse() 114 e->match.reqid = 1; in policy_parse() 115 e->invert.reqid = cb->invert; in policy_parse() 116 e->reqid = cb->val.u32; in policy_parse() 211 !(e->match.reqid || e->match.spi || e->match.saddr || in policy_check() 267 if (e->match.reqid) { in print_entry() 268 PRINT_INVERT(e->invert.reqid); in print_entry() 269 printf(" %sreqid %u", prefix, e->reqid); in print_entry()
|
D | libxt_policy.man | 27 [\fB!\fP] \fB\-\-reqid\fP \fIid\fP 28 Matches the reqid of the policy rule. The reqid can be specified with
|
/external/iptables/include/linux/netfilter/ |
D | xt_policy.h | 26 reqid:1; member 44 __u32 reqid; member
|
/external/kernel-headers/original/uapi/linux/netfilter/ |
D | xt_policy.h | 26 reqid:1; member 55 __u32 reqid; member
|
/external/iproute2/include/linux/ |
D | xfrm.h | 239 __u32 reqid; member 367 __u32 reqid; member 395 __u32 reqid; member 474 __u32 reqid; member 481 __u32 reqid; member
|
/external/kernel-headers/original/uapi/linux/ |
D | xfrm.h | 239 __u32 reqid; member 367 __u32 reqid; member 395 __u32 reqid; member 474 __u32 reqid; member 481 __u32 reqid; member
|
/external/ipsec-tools/src/libipsec/ |
D | pfkey.c | 378 struct sockaddr *dst, u_int32_t min, u_int32_t max, u_int32_t reqid, in pfkey_send_getspi() argument 439 p = pfkey_setsadbxsa2(p, ep, mode, reqid); in pfkey_send_getspi() 1296 p = pfkey_setsadbxsa2(p, ep, sa_parms->mode, sa_parms->reqid); in pfkey_send_x1() 2239 pfkey_setsadbxsa2(caddr_t buf, caddr_t lim, u_int32_t mode0, u_int32_t reqid) in pfkey_setsadbxsa2() argument 2255 p->sadb_x_sa2_reqid = reqid; in pfkey_setsadbxsa2() 2358 struct sockaddr *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, in pfkey_send_update() argument 2374 psaa.reqid = reqid; in pfkey_send_update() 2392 struct sockaddr *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, in pfkey_send_update_nat() argument 2410 psaa.reqid = reqid; in pfkey_send_update_nat() 2433 struct sockaddr *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, in pfkey_send_add() argument [all …]
|
D | libpfkey.h | 75 u_int32_t reqid; member
|
/external/ppp/pppd/ |
D | fsm.c | 222 fsm_sdata(f, TERMREQ, f->reqid = ++f->id, 298 fsm_sdata(f, TERMREQ, f->reqid = ++f->id, 490 if (id != f->reqid || f->seen_ack) /* Expected id? */ 551 if (id != f->reqid || f->seen_ack) /* Expected id? */ 763 f->reqid = ++f->id; 782 fsm_sdata(f, CONFREQ, f->reqid, outp, cilen);
|
D | fsm.h | 72 u_char reqid; /* Current request id */ member
|
D | ccp.c | 494 if (ccp_localstate[f->unit] & RACK_PENDING && id == f->reqid) { 1653 fsm_sdata(f, CCP_RESETREQ, f->reqid = ++f->id, NULL, 0); 1672 fsm_sdata(f, CCP_RESETREQ, f->reqid, NULL, 0);
|
/external/iproute2/ip/ |
D | xfrm_monitor.c | 226 static void xfrm_usersa_print(const struct xfrm_usersa_id *sa_id, __u32 reqid, FILE *fp) in xfrm_usersa_print() argument 235 fprintf(fp, " reqid 0x%x", reqid); in xfrm_usersa_print() 256 xfrm_usersa_print(&id->sa_id, id->reqid, fp); in xfrm_ae_print() 285 xfrm_usersa_print(&map->id, map->reqid, fp); in xfrm_mapping_print()
|
D | xfrm.h | 132 __u8 mode, __u32 reqid, __u16 family, int force_spi, 152 int xfrm_reqid_parse(__u32 *reqid, int *argcp, char ***argvp);
|
D | ipxfrm.c | 281 __u8 mode, __u32 reqid, __u16 family, int force_spi, in xfrm_id_info_print() argument 311 fprintf(fp, "reqid %u", reqid); in xfrm_id_info_print() 313 fprintf(fp, "(0x%08x)", reqid); in xfrm_id_info_print() 612 tmpl->reqid, tmpl->family, 0, fp, prefix, "tmpl "); in xfrm_tmpl_print() 891 xsinfo->reqid, xsinfo->family, force_spi, fp, in xfrm_state_info_print() 1206 int xfrm_reqid_parse(__u32 *reqid, int *argcp, char ***argvp) in xfrm_reqid_parse() argument 1211 if (get_u32(reqid, *argv, 0)) in xfrm_reqid_parse()
|
D | xfrm_state.c | 318 xfrm_reqid_parse(&req.xsinfo.reqid, &argc, &argv); in xfrm_state_modify() 737 xfrm_reqid_parse(&req.xspi.info.reqid, &argc, &argv); in xfrm_state_allocspi() 859 if ((xsinfo->reqid^filter.xsinfo.reqid)&filter.reqid_mask) in xfrm_state_filter_match() 1113 xfrm_reqid_parse(&filter.xsinfo.reqid, &argc, &argv); in xfrm_state_list_or_deleteall()
|
D | xfrm_policy.c | 190 xfrm_reqid_parse(&tmpl->reqid, &argc, &argv); in xfrm_tmpl_parse()
|
/external/ipsec-tools/src/racoon/ |
D | backupsa.c | 153 sa_args->mode, sa_args->reqid, sa_args->wsize, sa_args->e_type, 271 GETNEXTNUM(sa_args.reqid, strtoul); in backupsa_from_file()
|
D | policy.h | 94 u_int32_t reqid; /* reqid id who owned this SA */ member
|
D | proposal.c | 1119 newpr->reqid_out = req->saidx.reqid; 1121 newpr->reqid_in = req->saidx.reqid; 1142 pr->reqid_in = req->saidx.reqid; 1144 pr->reqid_out = req->saidx.reqid;
|
D | pfkey.c | 1127 sa_args.reqid = pr->reqid_in; 1423 sa_args.reqid = pr->reqid_out; 3011 (*p_isr)->saidx.reqid =
|
/external/iptables/tests/ |
D | options-most.rules | 12 … --pol ipsec --strict --reqid 1 --spi 0x1 --proto esp --mode tunnel --tunnel-dst fe80::/64 --tunne… 35 … --pol ipsec --strict --reqid 1 --spi 0x1 --proto esp --mode tunnel --tunnel-dst fe80::/64 --tunne…
|