/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/setkey/ |
H A D | scriptdump.pl | 22 } elsif (/^\t(esp|ah) mode=(\S+) spi=(\d+).*reqid=(\d+)/) { 23 ($proto, $ipsecmode, $spi, $reqid) = ($1, $2, $3, $4); 37 print " -u $reqid" if $reqid;
|
/macosx-10.9.5/tcl-102/tcl_ext/tclsoap/tclsoap/ |
H A D | jsonrpc.tcl | 118 proc ::JSONRPC::fault {jsonver reqid faultcode faultstring {detail {}}} { 127 return [jsonresponse $jsonver $reqid $err error] 397 # reqid - the request id to which this is the response 402 proc ::JSONRPC::jsonresponse {jsonver reqid value {type result}} { 404 set respflds [list error $value id $reqid] 406 set respflds [list result $value id $reqid]
|
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/ |
H A D | policy.h | 76 u_int32_t reqid; /* reqid id who owned this SA */ member in struct:secasindex
|
H A D | proposal.c | 928 "encmode=%s reqid=%d:%d)\n", 1096 newpr->reqid_out = req->saidx.reqid; 1098 newpr->reqid_in = req->saidx.reqid; 1119 pr->reqid_in = req->saidx.reqid; 1121 pr->reqid_out = req->saidx.reqid;
|
H A D | pfkey_racoon.c | 3044 (*p_isr)->saidx.reqid =
|
/macosx-10.9.5/ppp-727.90.1/Helpers/pppd/ |
H A D | fsm.h | 97 u_char reqid; /* Current request id */ member in struct:fsm
|
H A D | fsm.c | 267 fsm_sdata(f, TERMREQ, f->reqid = ++f->id, 299 fsm_sdata(f, TERMREQ, f->reqid = ++f->id, 552 if (id != f->reqid || f->seen_ack) /* Expected id? */ 612 if (id != f->reqid || f->seen_ack) /* Expected id? */ 795 fsm_sdata(f, TERMREQ, f->reqid = ++f->id, 834 f->reqid = ++f->id; 856 fsm_sdata(f, CONFREQ, f->reqid, outp, cilen);
|
H A D | ccp.c | 550 if (ccp_localstate[f->unit] & RACK_PENDING && id == f->reqid) { 1746 fsm_sdata(f, CCP_RESETREQ, f->reqid = ++f->id, NULL, 0); 1765 fsm_sdata(f, CCP_RESETREQ, f->reqid, NULL, 0);
|
/macosx-10.9.5/xnu-2422.115.4/bsd/netkey/ |
H A D | key.h | 89 u_int32_t reqid,
|
H A D | keydb.h | 48 u_int32_t reqid; /* reqid id who owned this SA */ member in struct:secasindex
|
H A D | key.c | 430 (idx)->reqid = (r); \ 509 #define CMP_PORT 0x2 /* additionally HEAD, reqid, mode. */ 510 #define CMP_REQID 0x4 /* additionally HEAD, reqid. */ 1335 saidx.reqid = 0; 1872 * If range violation of reqid, kernel will 1878 "key_msg2sp: reqid=%d range " 1884 /* allocate new reqid id if reqid is zero. */ 1886 u_int32_t reqid; local 1887 if ((reqid 5214 key_setsadbxsa2( u_int8_t mode, u_int32_t seq, u_int32_t reqid) argument 6411 u_int32_t reqid; local 6604 key_getspi2(struct sockaddr *src, struct sockaddr *dst, u_int8_t proto, u_int8_t mode, u_int32_t reqid, struct sadb_spirange *spirange) argument 6763 u_int32_t reqid; local 6987 u_int32_t reqid; local [all...] |
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSMacOSX/ |
H A D | pfkey.c | 366 pfkey_send_getspi(so, satype, mode, src, dst, min, max, reqid, seq) 370 u_int32_t min, max, reqid, seq; 430 p = pfkey_setsadbxsa2(p, ep, mode, reqid); 495 pfkey_send_update(so, satype, mode, src, dst, spi, reqid, wsize, 501 u_int32_t spi, reqid; 510 reqid, wsize, 526 pfkey_send_add(so, satype, mode, src, dst, spi, reqid, wsize, 532 u_int32_t spi, reqid; 541 reqid, wsize, 1128 pfkey_send_x1(so, type, satype, mode, src, dst, spi, reqid, wsiz [all...] |
/macosx-10.9.5/ppp-727.90.1/Drivers/L2TP/L2TP-plugin/ |
H A D | pfkey.c | 366 pfkey_send_getspi(so, satype, mode, src, dst, min, max, reqid, seq) 370 u_int32_t min, max, reqid, seq; 430 p = pfkey_setsadbxsa2(p, ep, mode, reqid); 495 pfkey_send_update(so, satype, mode, src, dst, spi, reqid, wsize, 501 u_int32_t spi, reqid; 510 reqid, wsize, 526 pfkey_send_add(so, satype, mode, src, dst, spi, reqid, wsize, 532 u_int32_t spi, reqid; 541 reqid, wsize, 1126 pfkey_send_x1(so, type, satype, mode, src, dst, spi, reqid, wsiz [all...] |
/macosx-10.9.5/xnu-2422.115.4/bsd/net/ |
H A D | if_utun_crypto_ipsec.c | 177 u_int32_t reqid, 198 saidx.reqid = reqid; 455 args_ipsec_v1->reqid, 542 u_int32_t reqid, 553 reqid, 572 args_ipsec_v1->reqid, 173 utun_ipsec_set_sah(struct secashead **sah, u_int8_t dir, u_int16_t proto, u_int8_t mode, u_int32_t reqid, struct sockaddr_storage *src_addr, struct sockaddr_storage *dst_addr) argument 538 utun_ipsec_get_spi(struct sockaddr_storage *src_addr, struct sockaddr_storage *dst_addr, u_int16_t proto, u_int8_t mode, u_int32_t reqid, u_int32_t spirange_min, u_int32_t spirange_max) argument
|
H A D | if_utun_crypto.h | 122 u_int32_t reqid; // policy's reqid, default to 0 for now since we are avoiding policies. member in struct:utun_crypto_keys_idx_ipsec_args_v1 169 u_int32_t reqid; // policy's reqid, default to 0 for now since we are avoiding policies. member in struct:utun_crypto_keys_ipsec_args_v1
|
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/Common/ |
H A D | pfkey.c | 358 u_int32_t min, u_int32_t max, u_int32_t reqid, u_int use_addtime, u_int64_t l_addtime, u_int32_t seq, u_int always_expire) 419 p = pfkey_setsadbxsa2(p, ep, mode, reqid, always_expire); 496 u_int32_t spi, u_int32_t reqid, u_int wsize, caddr_t keymat, u_int e_type, u_int e_keylen, 502 reqid, wsize, 521 u_int32_t spi, u_int32_t reqid, u_int wsize, caddr_t keymat, u_int e_type, u_int e_keylen, 527 reqid, wsize, 1108 struct sockaddr_storage *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, 1217 p = pfkey_setsadbxsa2(p, ep, mode, reqid, always_expire); 2175 pfkey_setsadbxsa2(caddr_t buf, caddr_t lim, u_int32_t mode0, u_int32_t reqid, u_int always_expire) argument 2191 p->sadb_x_sa2_reqid = reqid; 357 pfkey_send_getspi(int so, u_int satype, u_int mode, struct sockaddr_storage *src, struct sockaddr_storage *dst, u_int32_t min, u_int32_t max, u_int32_t reqid, u_int use_addtime, u_int64_t l_addtime, u_int32_t seq, u_int always_expire) argument 495 pfkey_send_update(int so, u_int satype, u_int mode, struct sockaddr_storage *src, struct sockaddr_storage *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, caddr_t keymat, u_int e_type, u_int e_keylen, u_int a_type, u_int a_keylen, u_int flags, u_int32_t l_alloc, u_int64_t l_bytes, u_int64_t l_addtime, u_int64_t l_usetime, u_int32_t seq, u_int16_t port, u_int always_expire) argument 520 pfkey_send_add(int so, u_int satype, u_int mode, struct sockaddr_storage *src, struct sockaddr_storage *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, caddr_t keymat, u_int e_type, u_int e_keylen, u_int a_type, u_int a_keylen, u_int flags, u_int32_t l_alloc, u_int64_t l_bytes, u_int64_t l_addtime, u_int64_t l_usetime, u_int32_t seq, u_int16_t port, u_int always_expire) argument 1107 pfkey_send_x1(int so, u_int type, u_int satype, u_int mode, struct sockaddr_storage *src, struct sockaddr_storage *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, caddr_t keymat, u_int e_type, u_int e_keylen, u_int a_type, u_int a_keylen, u_int flags, u_int32_t l_alloc, u_int32_t l_bytes, u_int32_t l_addtime, u_int32_t l_usetime, u_int32_t seq, u_int16_t port, u_int always_expire) argument [all...] |
/macosx-10.9.5/bind9-45.100/bind9/lib/export/samples/ |
H A D | nsprobe.c | 103 dns_clientreqtrans_t *reqid; member in struct:probe_trans 648 dns_client_destroyreqtrans(&trans->reqid); 706 REQUIRE(trans->reqid == NULL); 739 &trans->reqid); 851 REQUIRE(trans->reqid == NULL); 1149 probes[i].reqid = NULL;
|
/macosx-10.9.5/ntp-88/ntpd/ |
H A D | jupiter.h | 51 u_char reqid; /* JUPITER_REQID_MASK bits available as id */ member in struct:jheader
|
/macosx-10.9.5/xnu-2422.115.4/bsd/netinet6/ |
H A D | ipsec.c | 1523 (*q)->saidx.reqid = p->saidx.reqid; 3209 saidx.reqid = isr->saidx.reqid; 3487 saidx.reqid = isr->saidx.reqid; 3668 saidx.reqid = isr->saidx.reqid;
|
/macosx-10.9.5/xnu-2422.115.4/bsd/netinet/ |
H A D | ip_input.c | 2943 saidx.reqid = sp->req->saidx.reqid;
|