Lines Matching refs:cipso

6  * draft-ietf-cipso-ipsecurity-01.txt with additional tag types as found in
13 * https://tools.ietf.org/id/draft-ietf-cipso-ipsecurity-01.txt
471 kfree(doi_def->map.std->lvl.cipso);
473 kfree(doi_def->map.std->cat.cipso);
649 (doi_def->map.std->lvl.cipso[level] < CIPSO_V4_INV_LVL))
714 map_tbl->lvl.cipso[net_lvl] < CIPSO_V4_INV_LVL) {
715 *host_lvl = doi_def->map.std->lvl.cipso[net_lvl];
750 cipso_array = doi_def->map.std->cat.cipso;
859 net_cat_array = doi_def->map.std->cat.cipso;
1875 opt->opt.cipso = sizeof(struct iphdr);
1951 opt->opt.cipso = sizeof(struct iphdr);
1983 if (!opt || opt->opt.cipso == 0)
1992 cipso_off = opt->opt.cipso - sizeof(struct iphdr);
1996 if (opt->opt.srr > opt->opt.cipso)
1998 if (opt->opt.rr > opt->opt.cipso)
2000 if (opt->opt.ts > opt->opt.cipso)
2002 if (opt->opt.router_alert > opt->opt.cipso)
2004 opt->opt.cipso = 0;
2026 /* only the cipso option was present on the socket so we can
2074 * @cipso: the CIPSO v4 option
2078 * Inspect @cipso and return the security attributes in @secattr. Returns zero
2082 int cipso_v4_getattr(const unsigned char *cipso,
2089 if (cipso_v4_cache_check(cipso, cipso[1], secattr) == 0)
2092 doi = get_unaligned_be32(&cipso[2]);
2100 switch (cipso[6]) {
2102 ret_val = cipso_v4_parsetag_rbm(doi_def, &cipso[6], secattr);
2105 ret_val = cipso_v4_parsetag_enum(doi_def, &cipso[6], secattr);
2108 ret_val = cipso_v4_parsetag_rng(doi_def, &cipso[6], secattr);
2111 ret_val = cipso_v4_parsetag_loc(doi_def, &cipso[6], secattr);
2141 if (opt && opt->opt.cipso)
2143 opt->opt.cipso -
2210 opt->cipso = sizeof(struct iphdr);
2246 if (opt->cipso == 0)
2254 /* the easiest thing to do is just replace the cipso option with noop
2259 cipso_ptr = (unsigned char *)iph + opt->cipso;
2261 opt->cipso = 0;