/external/iptables/extensions/ |
D | libxt_policy.t | 5 -m policy --dir in --pol ipsec --strict --reqid 1 --spi 0x1 --proto ipcomp;=;OK 6 …--pol ipsec --strict --reqid 1 --spi 0x1 --proto esp --mode tunnel --tunnel-dst 10.0.0.0/8 --tunne… 7 -m policy --dir in --pol ipsec --strict --reqid 1 --spi 0x1 --proto esp --tunnel-dst 10.0.0.0/8;;FA… 8 …-pol ipsec --strict --reqid 1 --spi 0x1 --proto ipcomp --mode tunnel --tunnel-dst 10.0.0.0/8 --tun…
|
D | libxt_policy.c | 111 if (e->match.reqid) in policy_parse() 114 e->match.reqid = 1; in policy_parse() 115 e->invert.reqid = cb->invert; in policy_parse() 116 e->reqid = cb->val.u32; in policy_parse() 211 !(e->match.reqid || e->match.spi || e->match.saddr || in policy_check() 267 if (e->match.reqid) { in print_entry() 268 PRINT_INVERT(e->invert.reqid); in print_entry() 269 printf(" %sreqid %u", prefix, e->reqid); in print_entry()
|
D | libxt_policy.man | 27 [\fB!\fP] \fB\-\-reqid\fP \fIid\fP 28 Matches the reqid of the policy rule. The reqid can be specified with
|
/external/libnl/lib/xfrm/ |
D | template.c | 152 (a->reqid != b->reqid) || in xfrmnl_user_tmpl_cmp() 175 tmpl->id.spi, tmpl->reqid, in xfrmnl_user_tmpl_dump() 259 return utmpl->reqid; in xfrmnl_user_tmpl_get_reqid() 262 int xfrmnl_user_tmpl_set_reqid (struct xfrmnl_user_tmpl* utmpl, unsigned int reqid) in xfrmnl_user_tmpl_set_reqid() argument 264 utmpl->reqid = reqid; in xfrmnl_user_tmpl_set_reqid()
|
D | ae.c | 200 diff |= XFRM_AE_DIFF(REQID, a->reqid != b->reqid); in xfrm_ae_compare() 250 __ADD(XFRM_AE_ATTR_REQID, reqid), 304 ae->sa_id.spi, ae->reqid); in xfrm_ae_dump_line() 390 ae_id.reqid = tmpl->reqid; in build_xfrm_ae_message() 504 ae->reqid = ae_id->reqid; in xfrmnl_ae_parse() 784 return ae->reqid; in xfrmnl_ae_get_reqid() 789 int xfrmnl_ae_set_reqid (struct xfrmnl_ae* ae, unsigned int reqid) in xfrmnl_ae_set_reqid() argument 791 ae->reqid = reqid; in xfrmnl_ae_set_reqid()
|
D | sa.c | 230 diff |= XFRM_SA_DIFF(REQID, a->reqid != b->reqid); in xfrm_sa_compare() 318 __ADD(XFRM_SA_ATTR_REQID, reqid), 408 sa->id.spi, sa->reqid); in xfrm_sa_dump_line() 758 sa->reqid = sa_info->reqid; in xfrmnl_sa_parse() 1153 sa_info.reqid = tmpl->reqid; in build_xfrm_sa_message() 1572 return sa->reqid; in xfrmnl_sa_get_reqid() 1577 int xfrmnl_sa_set_reqid (struct xfrmnl_sa* sa, unsigned int reqid) in xfrmnl_sa_set_reqid() argument 1579 sa->reqid = reqid; in xfrmnl_sa_set_reqid()
|
/external/iptables/include/linux/netfilter/ |
D | xt_policy.h | 26 reqid:1; member 44 __u32 reqid; member
|
/external/kernel-headers/original/uapi/linux/netfilter/ |
D | xt_policy.h | 30 reqid:1; member 59 __u32 reqid; member
|
/external/libnl/include/linux-private/linux/ |
D | xfrm.h | 240 __u32 reqid; member 374 __u32 reqid; member 402 __u32 reqid; member 481 __u32 reqid; member 488 __u32 reqid; member
|
/external/iproute2/include/uapi/linux/ |
D | xfrm.h | 240 __u32 reqid; member 371 __u32 reqid; member 403 __u32 reqid; member 486 __u32 reqid; member 493 __u32 reqid; member
|
/external/iproute2/include/linux/ |
D | xfrm.h | 240 __u32 reqid; member 371 __u32 reqid; member 403 __u32 reqid; member 486 __u32 reqid; member 493 __u32 reqid; member
|
/external/kernel-headers/original/uapi/linux/ |
D | xfrm.h | 240 __u32 reqid; member 374 __u32 reqid; member 403 __u32 reqid; member 482 __u32 reqid; member 489 __u32 reqid; member
|
/external/ipsec-tools/src/libipsec/ |
D | pfkey.c | 378 struct sockaddr *dst, u_int32_t min, u_int32_t max, u_int32_t reqid, in pfkey_send_getspi() argument 439 p = pfkey_setsadbxsa2(p, ep, mode, reqid); in pfkey_send_getspi() 1296 p = pfkey_setsadbxsa2(p, ep, sa_parms->mode, sa_parms->reqid); in pfkey_send_x1() 2239 pfkey_setsadbxsa2(caddr_t buf, caddr_t lim, u_int32_t mode0, u_int32_t reqid) in pfkey_setsadbxsa2() argument 2255 p->sadb_x_sa2_reqid = reqid; in pfkey_setsadbxsa2() 2358 struct sockaddr *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, in pfkey_send_update() argument 2374 psaa.reqid = reqid; in pfkey_send_update() 2392 struct sockaddr *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, in pfkey_send_update_nat() argument 2410 psaa.reqid = reqid; in pfkey_send_update_nat() 2433 struct sockaddr *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, in pfkey_send_add() argument [all …]
|
/external/ppp/pppd/ |
D | fsm.c | 222 fsm_sdata(f, TERMREQ, f->reqid = ++f->id, 298 fsm_sdata(f, TERMREQ, f->reqid = ++f->id, 490 if (id != f->reqid || f->seen_ack) /* Expected id? */ 551 if (id != f->reqid || f->seen_ack) /* Expected id? */ 763 f->reqid = ++f->id; 782 fsm_sdata(f, CONFREQ, f->reqid, outp, cilen);
|
D | fsm.h | 72 u_char reqid; /* Current request id */ member
|
/external/iproute2/ip/ |
D | xfrm_monitor.c | 228 static void xfrm_usersa_print(const struct xfrm_usersa_id *sa_id, __u32 reqid, FILE *fp) in xfrm_usersa_print() argument 233 fprintf(fp, " reqid 0x%x", reqid); in xfrm_usersa_print() 251 xfrm_usersa_print(&id->sa_id, id->reqid, fp); in xfrm_ae_print() 277 xfrm_usersa_print(&map->id, map->reqid, fp); in xfrm_mapping_print()
|
D | xfrm.h | 142 __u8 mode, __u32 reqid, __u16 family, int force_spi, 162 int xfrm_reqid_parse(__u32 *reqid, int *argcp, char ***argvp);
|
D | ipxfrm.c | 274 __u8 mode, __u32 reqid, __u16 family, int force_spi, in xfrm_id_info_print() argument 299 fprintf(fp, "reqid %u", reqid); in xfrm_id_info_print() 301 fprintf(fp, "(0x%08x)", reqid); in xfrm_id_info_print() 596 tmpl->reqid, tmpl->family, 0, fp, prefix, "tmpl "); in xfrm_tmpl_print() 905 xsinfo->reqid, xsinfo->family, force_spi, fp, in xfrm_state_info_print() 1210 int xfrm_reqid_parse(__u32 *reqid, int *argcp, char ***argvp) in xfrm_reqid_parse() argument 1215 if (get_u32(reqid, *argv, 0)) in xfrm_reqid_parse()
|
D | xfrm_state.c | 336 xfrm_reqid_parse(&req.xsinfo.reqid, &argc, &argv); in xfrm_state_modify() 780 xfrm_reqid_parse(&req.xspi.info.reqid, &argc, &argv); in xfrm_state_allocspi() 902 if ((xsinfo->reqid^filter.xsinfo.reqid)&filter.reqid_mask) in xfrm_state_filter_match() 1164 xfrm_reqid_parse(&filter.xsinfo.reqid, &argc, &argv); in xfrm_state_list_or_deleteall()
|
/external/linux-kselftest/tools/testing/selftests/bpf/ |
D | test_tunnel.sh | 566 spi $spi_in_to_out reqid 1 mode tunnel \ 570 tmpl src 172.16.1.100 dst 172.16.1.200 proto esp reqid 1 \ 575 spi $spi_out_to_in reqid 2 mode tunnel \ 579 tmpl src 172.16.1.200 dst 172.16.1.100 proto esp reqid 2 \ 591 spi $spi_in_to_out reqid 1 mode tunnel \ 594 tmpl src 172.16.1.100 dst 172.16.1.200 proto esp reqid 1 \ 598 spi $spi_out_to_in reqid 2 mode tunnel \ 601 tmpl src 172.16.1.200 dst 172.16.1.100 proto esp reqid 2 \
|
/external/linux-kselftest/tools/testing/selftests/net/ |
D | rtnetlink.sh | 653 mode transport reqid 0x07 replay-window 32 \ 678 spi 0x07 mode transport reqid 0x07 776 mode transport reqid 42 780 mode transport reqid 42 784 mode transport reqid 42 $algo sel src $srcip/24 dst $dstip/24 \ 788 mode transport reqid 42 $algo sel src $dstip/24 dst $srcip/24 \
|
/external/ipsec-tools/src/racoon/ |
D | backupsa.c | 153 sa_args->mode, sa_args->reqid, sa_args->wsize, sa_args->e_type, 271 GETNEXTNUM(sa_args.reqid, strtoul); in backupsa_from_file()
|
D | policy.h | 94 u_int32_t reqid; /* reqid id who owned this SA */ member
|
D | proposal.c | 1119 newpr->reqid_out = req->saidx.reqid; 1121 newpr->reqid_in = req->saidx.reqid; 1142 pr->reqid_in = req->saidx.reqid; 1144 pr->reqid_out = req->saidx.reqid;
|
/external/libnl/include/netlink-private/ |
D | types.h | 1190 uint32_t reqid; member 1250 uint32_t reqid; member 1303 uint32_t reqid; member
|