• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iptables-1.4.12.1/extensions/

Lines Matching defs:match

26 "policy match options:\n"
27 " --dir in|out match policy applied during decapsulation/\n"
29 " --pol none|ipsec match policy\n"
30 " --strict match entire policy instead of single element\n"
33 "[!] --reqid reqid match reqid\n"
34 "[!] --spi spi match SPI\n"
35 "[!] --proto proto match protocol (ah/esp/ipcomp)\n"
36 "[!] --mode mode match mode (transport/tunnel)\n"
37 "[!] --tunnel-src addr/mask match tunnel source\n"
38 "[!] --tunnel-dst addr/mask match tunnel destination\n"
78 xtables_error(PARAMETER_PROBLEM, "policy match: invalid policy \"%s\"", s);
87 xtables_error(PARAMETER_PROBLEM, "policy match: invalid mode \"%s\"", s);
107 if (e->match.reqid)
109 "policy match: double --reqid option");
110 e->match.reqid = 1;
115 if (e->match.spi)
117 "policy match: double --spi option");
118 e->match.spi = 1;
123 if (e->match.saddr)
125 "policy match: double --tunnel-src option");
127 e->match.saddr = 1;
133 if (e->match.daddr)
135 "policy match: double --tunnel-dst option");
136 e->match.daddr = 1;
142 if (e->match.proto)
144 "policy match: double --proto option");
149 "policy match: protocol must be ah/esp/ipcomp");
150 e->match.proto = 1;
154 if (e->match.mode)
156 "policy match: double --mode option");
157 e->match.mode = 1;
164 "policy match: maximum policy depth reached");
181 "policy match: neither --dir in nor --dir out specified");
186 "policy match: policy none but --strict given");
190 "policy match: policy none but policy given");
200 "policy match: multiple elements but no --strict");
207 !(e->match.reqid || e->match.spi || e->match.saddr ||
208 e->match.daddr || e->match.proto || e->match.mode))
210 "policy match: empty policy element %u. "
215 if ((e->match.saddr || e->match.daddr)
219 "policy match: --tunnel-src/--tunnel-dst "
263 if (e->match.reqid) {
267 if (e->match.spi) {
271 if (e->match.proto) {
275 if (e->match.mode) {
279 if (e->match.daddr) {
290 if (e->match.saddr) {
319 static void policy4_print(const void *ip, const struct xt_entry_match *match,
322 const struct xt_policy_info *info = (void *)match->data;
325 printf(" policy match");
334 static void policy6_print(const void *ip, const struct xt_entry_match *match,
337 const struct xt_policy_info *info = (void *)match->data;
340 printf(" policy match");
349 static void policy4_save(const void *ip, const struct xt_entry_match *match)
351 const struct xt_policy_info *info = (void *)match->data;
362 static void policy6_save(const void *ip, const struct xt_entry_match *match)
364 const struct xt_policy_info *info = (void *)match->data;