Searched refs:xfrm (Results 51 - 75 of 158) sorted by relevance

1234567

/linux-master/net/ipv4/
H A Dipcomp.c16 #include <net/xfrm.h>
179 pr_info("%s: can't add xfrm type\n", __func__);
H A Dtunnel4.c17 #include <net/xfrm.h>
H A Dgre_demux.c27 #include <net/xfrm.h>
/linux-master/net/openvswitch/
H A Dvport-internal_dev.c14 #include <net/xfrm.h>
/linux-master/net/ipv6/
H A Dipcomp6.c25 #include <net/xfrm.h>
198 pr_info("%s: can't add xfrm type\n", __func__);
H A Dnetfilter.c17 #include <net/xfrm.h>
H A Dtunnel6.c20 #include <net/xfrm.h>
H A Dxfrm6_input.c18 #include <net/xfrm.h>
151 * IPsec xfrm input.
152 * Returns 0 if skb passed to xfrm or was dropped.
H A Dxfrm6_protocol.c2 /* xfrm6_protocol.c - Generic xfrm protocol multiplexer for ipv6.
20 #include <net/xfrm.h>
/linux-master/net/l2tp/
H A Dl2tp_core.h15 #include <net/xfrm.h>
H A Dl2tp_debugfs.c26 #include <net/xfrm.h>
/linux-master/security/selinux/
H A Dnlmsgtab.c15 #include <linux/xfrm.h>
/linux-master/drivers/net/ethernet/mellanox/mlx5/core/en_accel/
H A Dipsec.h38 #include <net/xfrm.h>
H A Dipsec_rxtx.c35 #include <net/xfrm.h>
/linux-master/net/dccp/
H A Dminisocks.c16 #include <net/xfrm.h>
/linux-master/tools/testing/selftests/net/netfilter/
H A Dnft_flowtable.sh632 ip -net "$ns" xfrm state add src "$remote" dst "$me" proto esp spi "$spi_in" enc aes "$KEY_AES" auth sha1 "$KEY_SHA" mode tunnel sel src "$rnet" dst "$lnet"
633 ip -net "$ns" xfrm state add src "$me" dst "$remote" proto esp spi "$spi_out" enc aes "$KEY_AES" auth sha1 "$KEY_SHA" mode tunnel sel src "$lnet" dst "$rnet"
636 ip -net "$ns" xfrm policy add src "$lnet" dst "$rnet" dir out tmpl src "$me" dst "$remote" proto esp mode tunnel priority 1 action allow
638 ip -net "$ns" xfrm policy add src "$rnet" dst "$lnet" dir fwd tmpl src "$remote" dst "$me" proto esp mode tunnel priority 1 action allow
/linux-master/tools/testing/selftests/net/
H A DMakefile21 TEST_PROGS += vrf-xfrm-tests.sh
H A Dpmtu.sh123 # Set up vti tunnel on top of veth, with xfrm states and policies, in two
135 # add xfrm states and policies with ESP-in-UDP encapsulation. Check that
141 # Set up vti6 tunnel on top of veth, with xfrm states and policies, in two
672 run_cmd ${ns_a} ip -${proto} xfrm state add src ${veth_a_addr} dst ${veth_b_addr} spi 0x1000 proto esp aead 'rfc4106(gcm(aes))' 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f 128 mode tunnel ${encap} || return 1
673 run_cmd ${ns_a} ip -${proto} xfrm state add src ${veth_b_addr} dst ${veth_a_addr} spi 0x1001 proto esp aead 'rfc4106(gcm(aes))' 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f 128 mode tunnel ${encap}
674 run_cmd ${ns_a} ip -${proto} xfrm policy add dir out mark 10 tmpl src ${veth_a_addr} dst ${veth_b_addr} proto esp mode tunnel
675 run_cmd ${ns_a} ip -${proto} xfrm policy add dir in mark 10 tmpl src ${veth_b_addr} dst ${veth_a_addr} proto esp mode tunnel
677 run_cmd ${ns_b} ip -${proto} xfrm state add src ${veth_a_addr} dst ${veth_b_addr} spi 0x1000 proto esp aead 'rfc4106(gcm(aes))' 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f 128 mode tunnel ${encap}
678 run_cmd ${ns_b} ip -${proto} xfrm state add src ${veth_b_addr} dst ${veth_a_addr} spi 0x1001 proto esp aead 'rfc4106(gcm(aes))' 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f 128 mode tunnel ${encap}
679 run_cmd ${ns_b} ip -${proto} xfrm polic
[all...]
/linux-master/net/netfilter/
H A Dnft_rt.c92 nft_reg_store8(dest, !!dst->xfrm);
/linux-master/drivers/staging/octeon/
H A Dethernet-tx.c18 #include <linux/xfrm.h>
19 #include <net/xfrm.h>
/linux-master/net/xfrm/
H A Dxfrm_device.c19 #include <net/xfrm.h>
422 !xdst->child->xfrm)) {
H A Dxfrm_compat.c9 #include <linux/xfrm.h>
10 #include <net/xfrm.h>
H A Dxfrm_ipcomp.c25 #include <net/xfrm.h>
/linux-master/drivers/net/netdevsim/
H A Dipsec.c6 #include <net/xfrm.h>
246 netdev_err(ns->netdev, "no xfrm state len = %d\n",
/linux-master/tools/testing/selftests/sgx/
H A Dload.c91 secs->xfrm = 3;

Completed in 403 milliseconds

1234567