Searched refs:encap (Results 26 - 50 of 120) sorted by relevance

12345

/linux-master/tools/testing/selftests/net/
H A Dpmtu.sh401 encap="${3}"
430 run_cmd ${ns_a} ip link add ${encap}_a type ${type} ${mode} local ${a_addr} remote ${b_addr} encap ${encap} encap-sport auto encap-dport 5556 || return $ksft_skip
433 run_cmd ${ns_b} ip link add ${encap}_b type ${type} ${mode} local ${b_addr} remote ${a_addr} encap ${encap} encap
[all...]
H A Dsrv6_end_dt46_l3vpn_test.sh137 # |cafe::2 |apply seg6 encap segs fc00:12:100::6046|
141 # |10.0.0.2 |apply seg6 encap segs fc00:12:100::6046|
150 # |cafe::4 |apply seg6 encap segs fc00:12:200::6046|
154 # |10.0.0.4 |apply seg6 encap segs fc00:12:200::6046|
173 # |cafe::1 |apply seg6 encap segs fc00:21:100::6046|
177 # |10.0.0.1 |apply seg6 encap segs fc00:21:100::6046|
186 # |cafe::3 |apply seg6 encap segs fc00:21:200::6046|
190 # |10.0.0.3 |apply seg6 encap segs fc00:21:200::6046|
335 # set the encap route for encapsulating packets which arrive from the
338 encap seg
[all...]
H A Dsrv6_end_dt4_l3vpn_test.sh123 # |10.0.0.2 |apply seg6 encap segs fc00:12:100::6004|
132 # |10.0.0.4 |apply seg6 encap segs fc00:12:200::6004|
151 # |10.0.0.1 |apply seg6 encap segs fc00:21:100::6004|
160 # |10.0.0.3 |apply seg6 encap segs fc00:21:200::6004|
291 # set the encap route for encapsulating packets which arrive from the
294 encap seg6 mode encap segs ${vpn_sid} dev veth0
301 encap seg6local action End.DT4 vrftable ${tid} dev vrf-${tid}
H A Dsrv6_end_dt6_l3vpn_test.sh124 # |cafe::2 |apply seg6 encap segs fc00:12:100::6006|
133 # |cafe::4 |apply seg6 encap segs fc00:12:200::6006|
152 # |cafe::1 |apply seg6 encap segs fc00:21:100::6006|
161 # |cafe::3 |apply seg6 encap segs fc00:21:200::6006|
296 # set the encap route for encapsulating packets which arrive from the
299 encap seg6 mode encap segs ${vpn_sid} dev veth0
306 encap seg6local action End.DT6 vrftable ${tid} dev vrf-${tid}
H A Dsrv6_hl2encap_red_l2vpn_test.sh379 encap seg6local action End dev "${DUMMY_DEVNAME}"
396 # $5 - encap mode (full or red)
422 encap seg6 mode "${mode}" segs "${policy}" \
427 encap seg6 mode "${mode}" segs "${policy}" \
455 encap seg6local action End.DX2 oif "${RT2HS_DEVNAME}" \
H A Dsrv6_end_flavors_test.sh479 encap seg6local action End dev "${DUMMY_DEVNAME}"
553 encap seg6local action ${behavior_cfg} \
565 encap seg6 mode inline segs "${policy}" \
806 add "${IPv6_TESTS_ADDR}" encap seg6local \
H A Dl2tp.sh143 encap ip local 10.1.1.1 remote 10.1.2.1
153 encap ip local 10.1.2.1 remote 10.1.1.1
172 encap ip local 2001:db8:1::1 remote 2001:db8:2::1
182 encap ip local 2001:db8:2::1 remote 2001:db8:1::1
/linux-master/net/l2tp/
H A Dl2tp_core.c366 /* IP encap expects session IDs to be globally unique, while
367 * UDP encap doesn't.
371 (session_walk->tunnel->encap == L2TP_ENCAPTYPE_IP ||
372 tunnel->encap == L2TP_ENCAPTYPE_IP)) {
1008 if (tunnel->encap == L2TP_ENCAPTYPE_UDP) {
1070 uhlen = (tunnel->encap == L2TP_ENCAPTYPE_UDP) ? sizeof(*uh) : 0;
1104 /* Report transmitted length before we add encap header, which keeps
1105 * statistics consistent for both UDP and IP encap tx/rx paths.
1110 switch (tunnel->encap) {
1183 switch (tunnel->encap) {
1437 enum l2tp_encap_type encap = L2TP_ENCAPTYPE_UDP; local
1476 l2tp_validate_socket(const struct sock *sk, const struct net *net, enum l2tp_encap_type encap) argument
[all...]
H A Dl2tp_debugfs.c156 if (tunnel->encap == L2TP_ENCAPTYPE_UDP)
161 tunnel->encap == L2TP_ENCAPTYPE_UDP ? "UDP" :
162 tunnel->encap == L2TP_ENCAPTYPE_IP ? "IP" :
H A Dl2tp_netlink.c218 cfg.encap = nla_get_u16(attrs[L2TP_ATTR_ENCAP_TYPE]);
233 switch (cfg.encap) {
318 enum l2tp_encap_type encap)
323 switch (encap) {
346 enum l2tp_encap_type encap)
350 switch (encap) {
379 return l2tp_nl_tunnel_send_addr6(skb, sk, tunnel->encap);
381 return l2tp_nl_tunnel_send_addr4(skb, sk, tunnel->encap);
398 nla_put_u16(skb, L2TP_ATTR_ENCAP_TYPE, tunnel->encap))
317 l2tp_nl_tunnel_send_addr6(struct sk_buff *skb, struct sock *sk, enum l2tp_encap_type encap) argument
345 l2tp_nl_tunnel_send_addr4(struct sk_buff *skb, struct sock *sk, enum l2tp_encap_type encap) argument
/linux-master/tools/testing/selftests/bpf/prog_tests/
H A Dcls_redirect.c218 static void encap_init(encap_headers_t *encap, uint8_t hop_count, uint8_t proto) argument
222 *encap = (encap_headers_t){
248 encap_headers_t encap; local
261 encap_init(&encap, test->hops == ONE_HOP ? 1 : 0, proto);
262 p = mempcpy(p, &encap, sizeof(encap));
/linux-master/drivers/crypto/caam/
H A Dblob_gen.c63 struct caam_blob_info *info, bool encap)
78 if (encap) {
62 caam_process_blob(struct caam_blob_priv *priv, struct caam_blob_info *info, bool encap) argument
/linux-master/net/core/
H A Dlwtunnel.c34 * the encap need to return a string here.
52 /* module autoload not supported for encap type */
112 struct nlattr *encap, unsigned int family,
122 NL_SET_ERR_MSG_ATTR(extack, encap,
135 ret = ops->build_state(net, encap, family, cfg, lws, extack);
142 NL_SET_ERR_MSG_ATTR(extack, encap,
111 lwtunnel_build_state(struct net *net, u16 encap_type, struct nlattr *encap, unsigned int family, const void *cfg, struct lwtunnel_state **lws, struct netlink_ext_ack *extack) argument
/linux-master/samples/bpf/
H A Dlwt_len_hist.sh33 ip route add 192.168.253.2/32 encap bpf out obj $BPF_PROG section len_hist dev $VETH0
/linux-master/net/ipv4/
H A Dxfrm4_tunnel.c32 if (x->encap) {
/linux-master/include/net/
H A Dlwtunnel.h40 int (*build_state)(struct net *net, struct nlattr *encap,
123 struct nlattr *encap,
219 struct nlattr *encap,
218 lwtunnel_build_state(struct net *net, u16 encap_type, struct nlattr *encap, unsigned int family, const void *cfg, struct lwtunnel_state **lws, struct netlink_ext_ack *extack) argument
/linux-master/tools/testing/selftests/net/forwarding/
H A Dipip_lib.sh335 local encap=$1; shift
340 check_fail $? "ping $encap should not pass with size 1800"
347 log_test "ping $encap packet size 1800 after MTU change"
/linux-master/net/ipv6/
H A Dip6_offload.c118 bool encap, udpfrag; local
130 encap = SKB_GSO_CB(skb)->encap_level > 0;
131 if (encap)
143 udpfrag = proto == IPPROTO_UDP && encap &&
187 if (encap)
/linux-master/net/netfilter/
H A Dnf_flow_table_offload.c120 tuple->encap[0].proto == htons(ETH_P_8021Q)) {
123 tuple->encap[0].id,
124 tuple->encap[0].proto);
129 tuple->encap[1].proto == htons(ETH_P_8021Q)) {
134 tuple->encap[1].id,
135 tuple->encap[1].proto);
140 tuple->encap[1].id,
141 tuple->encap[1].proto);
650 if (tuple->encap[i].proto == htons(ETH_P_8021Q)) {
666 switch (other_tuple->encap[
[all...]
/linux-master/drivers/net/ethernet/mellanox/mlx5/core/en/tc/act/
H A Dmirred.c156 if (parse_state->encap ||
191 parse_state->encap = false;
200 /* attr->dests[].vport is resolved when we handle encap */
312 if (parse_state->encap)
H A Dact.h20 bool encap; member in struct:mlx5e_tc_act_parse_state
/linux-master/tools/testing/selftests/bpf/
H A Dtest_lwt_seg6local.sh121 ip netns exec ${NS2} ip -6 route add fb00::6 encap bpf in obj ${BPF_FILE} sec encap_srh dev veth2
125 ip netns exec ${NS3} ip -6 route add fd00::1 encap seg6local action End.BPF endpoint obj ${BPF_FILE} sec add_egr_x dev veth4
127 ip netns exec ${NS4} ip -6 route add fd00::2 encap seg6local action End.BPF endpoint obj ${BPF_FILE} sec pop_egr dev veth6
132 ip netns exec ${NS5} ip -6 route add fd00::3 encap seg6local action End.BPF endpoint obj ${BPF_FILE} sec inspect_t dev veth8
H A Dtest_lwt_ip_encap.sh32 # ping: SRC->[encap at veth1:egress]->GRE:decap->DST
38 # ping: SRC->[encap at veth2:ingress]->GRE:decap->DST
361 echo "starting egress ${ENCAP} encap test ${VRF}"
376 ip -netns ${NS1} route add ${IPv4_DST} encap bpf xmit obj \
378 ip -netns ${NS1} -6 route add ${IPv6_DST} encap bpf xmit obj \
381 ip -netns ${NS1} route add ${IPv4_DST} encap bpf xmit obj \
383 ip -netns ${NS1} -6 route add ${IPv6_DST} encap bpf xmit obj \
386 echo " unknown encap ${ENCAP}"
416 echo "starting ingress ${ENCAP} encap test ${VRF}"
434 ip -netns ${NS2} route add ${IPv4_DST} encap bp
[all...]
/linux-master/drivers/net/ethernet/sfc/
H A Def100_tx.c196 bool encap = skb->encapsulation; local
211 if (encap) {
247 ESF_GZ_TX_TSO_ED_OUTER_IP_LEN, encap && !gso_partial,
248 ESF_GZ_TX_TSO_ED_OUTER_IP4_ID, encap ? mangleid :
/linux-master/net/xfrm/
H A Dxfrm_state.c455 .encap = XFRM_MODE_BEET,
460 .encap = XFRM_MODE_TRANSPORT,
464 .encap = XFRM_MODE_TUNNEL,
472 .encap = XFRM_MODE_BEET,
477 .encap = XFRM_MODE_ROUTEOPTIMIZATION,
481 .encap = XFRM_MODE_TRANSPORT,
485 .encap = XFRM_MODE_TUNNEL,
491 static const struct xfrm_mode *xfrm_get_mode(unsigned int encap, int family) argument
495 if (unlikely(encap >= XFRM_MODE_MAX))
500 mode = &xfrm4_mode_map[encap];
1657 xfrm_state_clone(struct xfrm_state *orig, struct xfrm_encap_tmpl *encap) argument
1810 xfrm_state_migrate(struct xfrm_state *x, struct xfrm_migrate *m, struct xfrm_encap_tmpl *encap) argument
2488 km_migrate(const struct xfrm_selector *sel, u8 dir, u8 type, const struct xfrm_migrate *m, int num_migrate, const struct xfrm_kmaddress *k, const struct xfrm_encap_tmpl *encap) argument
[all...]

Completed in 204 milliseconds

12345