Lines Matching defs:type

79  * xfrm_pol_inexact_bin = hash(dir,type,family,if_id);
119 u8 dir, type;
190 xfrm_policy_inexact_lookup(struct net *net, u8 type, u16 family, u8 dir,
195 u8 type, u16 family, u8 dir, u32 if_id);
301 if (x->type->flags & XFRM_TYPE_LOCAL_COADDR) {
305 if (x->type->flags & XFRM_TYPE_REMOTE_COADDR) {
555 if (!entry0 || pol->xdo.type == XFRM_DEV_OFFLOAD_PACKET) {
718 .type = pol->type,
886 if (newpos && policy->xdo.type != XFRM_DEV_OFFLOAD_PACKET)
1370 if (newpos && policy->xdo.type != XFRM_DEV_OFFLOAD_PACKET)
1474 u32 a = k->type << 24 | k->dir << 16 | k->family;
1501 ret = b->k.type ^ key->type;
1528 if (pol->type == policy->type &&
1545 if (newpos && policy->xdo.type != XFRM_DEV_OFFLOAD_PACKET)
1563 if (pol->type == policy->type &&
1582 if (newpos && policy->xdo.type != XFRM_DEV_OFFLOAD_PACKET)
1642 u32 if_id, u8 type, int dir, struct xfrm_selector *sel,
1651 if (pol->type == type &&
1664 u8 type, int dir, struct xfrm_selector *sel,
1678 bin = xfrm_policy_inexact_lookup(net, type,
1697 if_id, type, dir,
1706 pol = __xfrm_policy_bysel_ctx(chain, mark, if_id, type, dir,
1734 u8 type, int dir, u32 id, int delete, int *err)
1748 if (pol->type == type && pol->index == id &&
1774 xfrm_policy_flush_secctx_check(struct net *net, u8 type, bool task_valid)
1782 pol->type != type)
1817 xfrm_policy_flush_secctx_check(struct net *net, u8 type, bool task_valid)
1830 int xfrm_policy_flush(struct net *net, u8 type, bool task_valid)
1837 err = xfrm_policy_flush_secctx_check(net, type, task_valid);
1848 pol->type != type)
1919 if (walk->type >= XFRM_POLICY_TYPE_MAX &&
1920 walk->type != XFRM_POLICY_TYPE_ANY)
1937 if (walk->type != XFRM_POLICY_TYPE_ANY &&
1938 walk->type != pol->type)
1959 void xfrm_policy_walk_init(struct xfrm_policy_walk *walk, u8 type)
1963 walk->type = type;
1986 u8 type, u16 family, u32 if_id)
1995 pol->type != type)
2076 xfrm_policy_inexact_lookup_rcu(struct net *net, u8 type, u16 family,
2081 .type = type,
2093 xfrm_policy_inexact_lookup(struct net *net, u8 type, u16 family,
2101 bin = xfrm_policy_inexact_lookup_rcu(net, type, family, dir, if_id);
2111 u8 type, u16 family, u32 if_id)
2125 err = xfrm_policy_match(pol, fl, type, family, if_id);
2150 u8 type, u16 family, u32 if_id)
2158 fl, type, family, if_id);
2170 static struct xfrm_policy *xfrm_policy_lookup_bytype(struct net *net, u8 type,
2197 err = xfrm_policy_match(pol, fl, type, family, if_id);
2210 if (ret && ret->xdo.type == XFRM_DEV_OFFLOAD_PACKET)
2213 bin = xfrm_policy_inexact_lookup_rcu(net, type, family, dir, if_id);
2218 pol = xfrm_policy_eval_candidates(&cand, ret, fl, type,
2359 if (pol && pol->type != XFRM_POLICY_TYPE_MAIN)
2409 newp->type = old->type;
2703 if (xfrm[i]->xso.type != XFRM_DEV_OFFLOAD_PACKET)
2734 if (xfrm[i]->type->flags & XFRM_TYPE_NON_FRAGMENT)
2794 pols[0]->type != XFRM_POLICY_TYPE_MAIN) {
3332 if (!x->type->reject)
3334 return x->type->reject(x, skb, fl);
3421 fl4->fl4_icmp_type = flkeys->icmp.type;
3455 fl6->fl6_icmp_type = flkeys->icmp.type;
3740 if (pols[0]->type != XFRM_POLICY_TYPE_MAIN) {
4036 if (xfrm->type->flags & XFRM_TYPE_REMOTE_COADDR)
4038 else if (!(xfrm->type->flags & XFRM_TYPE_LOCAL_COADDR))
4452 u8 dir, u8 type, struct net *net, u32 if_id)
4463 pol->type == type) {
4476 pol->type == type) {
4597 int xfrm_migrate(const struct xfrm_selector *sel, u8 dir, u8 type,
4622 pol = xfrm_migrate_policy_find(sel, dir, type, net, if_id);
4657 km_migrate(sel, dir, type, m, num_migrate, k, encap);