Searched refs:reqid (Results 1 - 20 of 20) sorted by relevance

/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/setkey/
H A Dscriptdump.pl22 } elsif (/^\t(esp|ah) mode=(\S+) spi=(\d+).*reqid=(\d+)/) {
23 ($proto, $ipsecmode, $spi, $reqid) = ($1, $2, $3, $4);
37 print " -u $reqid" if $reqid;
/macosx-10.9.5/tcl-102/tcl_ext/tclsoap/tclsoap/
H A Djsonrpc.tcl118 proc ::JSONRPC::fault {jsonver reqid faultcode faultstring {detail {}}} {
127 return [jsonresponse $jsonver $reqid $err error]
397 # reqid - the request id to which this is the response
402 proc ::JSONRPC::jsonresponse {jsonver reqid value {type result}} {
404 set respflds [list error $value id $reqid]
406 set respflds [list result $value id $reqid]
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/
H A Dpolicy.h76 u_int32_t reqid; /* reqid id who owned this SA */ member in struct:secasindex
H A Dproposal.c928 "encmode=%s reqid=%d:%d)\n",
1096 newpr->reqid_out = req->saidx.reqid;
1098 newpr->reqid_in = req->saidx.reqid;
1119 pr->reqid_in = req->saidx.reqid;
1121 pr->reqid_out = req->saidx.reqid;
H A Dpfkey_racoon.c3044 (*p_isr)->saidx.reqid =
/macosx-10.9.5/ppp-727.90.1/Helpers/pppd/
H A Dfsm.h97 u_char reqid; /* Current request id */ member in struct:fsm
H A Dfsm.c267 fsm_sdata(f, TERMREQ, f->reqid = ++f->id,
299 fsm_sdata(f, TERMREQ, f->reqid = ++f->id,
552 if (id != f->reqid || f->seen_ack) /* Expected id? */
612 if (id != f->reqid || f->seen_ack) /* Expected id? */
795 fsm_sdata(f, TERMREQ, f->reqid = ++f->id,
834 f->reqid = ++f->id;
856 fsm_sdata(f, CONFREQ, f->reqid, outp, cilen);
H A Dccp.c550 if (ccp_localstate[f->unit] & RACK_PENDING && id == f->reqid) {
1746 fsm_sdata(f, CCP_RESETREQ, f->reqid = ++f->id, NULL, 0);
1765 fsm_sdata(f, CCP_RESETREQ, f->reqid, NULL, 0);
/macosx-10.9.5/xnu-2422.115.4/bsd/netkey/
H A Dkey.h89 u_int32_t reqid,
H A Dkeydb.h48 u_int32_t reqid; /* reqid id who owned this SA */ member in struct:secasindex
H A Dkey.c430 (idx)->reqid = (r); \
509 #define CMP_PORT 0x2 /* additionally HEAD, reqid, mode. */
510 #define CMP_REQID 0x4 /* additionally HEAD, reqid. */
1335 saidx.reqid = 0;
1872 * If range violation of reqid, kernel will
1878 "key_msg2sp: reqid=%d range "
1884 /* allocate new reqid id if reqid is zero. */
1886 u_int32_t reqid; local
1887 if ((reqid
5214 key_setsadbxsa2( u_int8_t mode, u_int32_t seq, u_int32_t reqid) argument
6411 u_int32_t reqid; local
6604 key_getspi2(struct sockaddr *src, struct sockaddr *dst, u_int8_t proto, u_int8_t mode, u_int32_t reqid, struct sadb_spirange *spirange) argument
6763 u_int32_t reqid; local
6987 u_int32_t reqid; local
[all...]
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSMacOSX/
H A Dpfkey.c366 pfkey_send_getspi(so, satype, mode, src, dst, min, max, reqid, seq)
370 u_int32_t min, max, reqid, seq;
430 p = pfkey_setsadbxsa2(p, ep, mode, reqid);
495 pfkey_send_update(so, satype, mode, src, dst, spi, reqid, wsize,
501 u_int32_t spi, reqid;
510 reqid, wsize,
526 pfkey_send_add(so, satype, mode, src, dst, spi, reqid, wsize,
532 u_int32_t spi, reqid;
541 reqid, wsize,
1128 pfkey_send_x1(so, type, satype, mode, src, dst, spi, reqid, wsiz
[all...]
/macosx-10.9.5/ppp-727.90.1/Drivers/L2TP/L2TP-plugin/
H A Dpfkey.c366 pfkey_send_getspi(so, satype, mode, src, dst, min, max, reqid, seq)
370 u_int32_t min, max, reqid, seq;
430 p = pfkey_setsadbxsa2(p, ep, mode, reqid);
495 pfkey_send_update(so, satype, mode, src, dst, spi, reqid, wsize,
501 u_int32_t spi, reqid;
510 reqid, wsize,
526 pfkey_send_add(so, satype, mode, src, dst, spi, reqid, wsize,
532 u_int32_t spi, reqid;
541 reqid, wsize,
1126 pfkey_send_x1(so, type, satype, mode, src, dst, spi, reqid, wsiz
[all...]
/macosx-10.9.5/xnu-2422.115.4/bsd/net/
H A Dif_utun_crypto_ipsec.c177 u_int32_t reqid,
198 saidx.reqid = reqid;
455 args_ipsec_v1->reqid,
542 u_int32_t reqid,
553 reqid,
572 args_ipsec_v1->reqid,
173 utun_ipsec_set_sah(struct secashead **sah, u_int8_t dir, u_int16_t proto, u_int8_t mode, u_int32_t reqid, struct sockaddr_storage *src_addr, struct sockaddr_storage *dst_addr) argument
538 utun_ipsec_get_spi(struct sockaddr_storage *src_addr, struct sockaddr_storage *dst_addr, u_int16_t proto, u_int8_t mode, u_int32_t reqid, u_int32_t spirange_min, u_int32_t spirange_max) argument
H A Dif_utun_crypto.h122 u_int32_t reqid; // policy's reqid, default to 0 for now since we are avoiding policies. member in struct:utun_crypto_keys_idx_ipsec_args_v1
169 u_int32_t reqid; // policy's reqid, default to 0 for now since we are avoiding policies. member in struct:utun_crypto_keys_ipsec_args_v1
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/Common/
H A Dpfkey.c358 u_int32_t min, u_int32_t max, u_int32_t reqid, u_int use_addtime, u_int64_t l_addtime, u_int32_t seq, u_int always_expire)
419 p = pfkey_setsadbxsa2(p, ep, mode, reqid, always_expire);
496 u_int32_t spi, u_int32_t reqid, u_int wsize, caddr_t keymat, u_int e_type, u_int e_keylen,
502 reqid, wsize,
521 u_int32_t spi, u_int32_t reqid, u_int wsize, caddr_t keymat, u_int e_type, u_int e_keylen,
527 reqid, wsize,
1108 struct sockaddr_storage *dst, u_int32_t spi, u_int32_t reqid, u_int wsize,
1217 p = pfkey_setsadbxsa2(p, ep, mode, reqid, always_expire);
2175 pfkey_setsadbxsa2(caddr_t buf, caddr_t lim, u_int32_t mode0, u_int32_t reqid, u_int always_expire) argument
2191 p->sadb_x_sa2_reqid = reqid;
357 pfkey_send_getspi(int so, u_int satype, u_int mode, struct sockaddr_storage *src, struct sockaddr_storage *dst, u_int32_t min, u_int32_t max, u_int32_t reqid, u_int use_addtime, u_int64_t l_addtime, u_int32_t seq, u_int always_expire) argument
495 pfkey_send_update(int so, u_int satype, u_int mode, struct sockaddr_storage *src, struct sockaddr_storage *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, caddr_t keymat, u_int e_type, u_int e_keylen, u_int a_type, u_int a_keylen, u_int flags, u_int32_t l_alloc, u_int64_t l_bytes, u_int64_t l_addtime, u_int64_t l_usetime, u_int32_t seq, u_int16_t port, u_int always_expire) argument
520 pfkey_send_add(int so, u_int satype, u_int mode, struct sockaddr_storage *src, struct sockaddr_storage *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, caddr_t keymat, u_int e_type, u_int e_keylen, u_int a_type, u_int a_keylen, u_int flags, u_int32_t l_alloc, u_int64_t l_bytes, u_int64_t l_addtime, u_int64_t l_usetime, u_int32_t seq, u_int16_t port, u_int always_expire) argument
1107 pfkey_send_x1(int so, u_int type, u_int satype, u_int mode, struct sockaddr_storage *src, struct sockaddr_storage *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, caddr_t keymat, u_int e_type, u_int e_keylen, u_int a_type, u_int a_keylen, u_int flags, u_int32_t l_alloc, u_int32_t l_bytes, u_int32_t l_addtime, u_int32_t l_usetime, u_int32_t seq, u_int16_t port, u_int always_expire) argument
[all...]
/macosx-10.9.5/bind9-45.100/bind9/lib/export/samples/
H A Dnsprobe.c103 dns_clientreqtrans_t *reqid; member in struct:probe_trans
648 dns_client_destroyreqtrans(&trans->reqid);
706 REQUIRE(trans->reqid == NULL);
739 &trans->reqid);
851 REQUIRE(trans->reqid == NULL);
1149 probes[i].reqid = NULL;
/macosx-10.9.5/ntp-88/ntpd/
H A Djupiter.h51 u_char reqid; /* JUPITER_REQID_MASK bits available as id */ member in struct:jheader
/macosx-10.9.5/xnu-2422.115.4/bsd/netinet6/
H A Dipsec.c1523 (*q)->saidx.reqid = p->saidx.reqid;
3209 saidx.reqid = isr->saidx.reqid;
3487 saidx.reqid = isr->saidx.reqid;
3668 saidx.reqid = isr->saidx.reqid;
/macosx-10.9.5/xnu-2422.115.4/bsd/netinet/
H A Dip_input.c2943 saidx.reqid = sp->req->saidx.reqid;

Completed in 335 milliseconds