/linux-master/net/xfrm/ |
H A D | xfrm_sysctl.c | 5 #include <net/xfrm.h> 9 net->xfrm.sysctl_aevent_etime = XFRM_AE_ETIME; 10 net->xfrm.sysctl_aevent_rseqth = XFRM_AE_SEQT_SIZE; 11 net->xfrm.sysctl_larval_drop = 1; 12 net->xfrm.sysctl_acq_expires = 30; 54 table[0].data = &net->xfrm.sysctl_aevent_etime; 55 table[1].data = &net->xfrm.sysctl_aevent_rseqth; 56 table[2].data = &net->xfrm.sysctl_larval_drop; 57 table[3].data = &net->xfrm.sysctl_acq_expires; 65 net->xfrm [all...] |
H A D | xfrm_policy.c | 36 #include <net/xfrm.h> 78 /* xfrm inexact policy search tree: 475 return __idx_hash(index, net->xfrm.policy_idx_hmask); 485 *dbits = net->xfrm.policy_bydst[dir].dbits4; 486 *sbits = net->xfrm.policy_bydst[dir].sbits4; 490 *dbits = net->xfrm.policy_bydst[dir].dbits6; 491 *sbits = net->xfrm.policy_bydst[dir].sbits6; 504 unsigned int hmask = net->xfrm.policy_bydst[dir].hmask; 515 return rcu_dereference_check(net->xfrm.policy_bydst[dir].table, 516 lockdep_is_held(&net->xfrm 2460 xfrm_tmpl_resolve_one(struct xfrm_policy *policy, const struct flowi *fl, struct xfrm_state **xfrm, unsigned short family) argument 2519 xfrm_tmpl_resolve(struct xfrm_policy **pols, int npols, const struct flowi *fl, struct xfrm_state **xfrm, unsigned short family) argument 2629 xfrm_bundle_create(struct xfrm_policy *policy, struct xfrm_state **xfrm, struct xfrm_dst **bundle, int nx, const struct flowi *fl, struct dst_entry *dst) argument 2823 struct xfrm_state *xfrm[XFRM_MAX_DEPTH]; local 4028 const struct xfrm_state *xfrm = dst->xfrm; local [all...] |
H A D | xfrm_state.c | 19 #include <net/xfrm.h> 36 rcu_dereference_protected((table), lockdep_is_held(&(net)->xfrm.xfrm_state_lock)) 64 return __xfrm_dst_hash(daddr, saddr, reqid, family, net->xfrm.state_hmask); 72 return __xfrm_src_hash(daddr, saddr, family, net->xfrm.state_hmask); 79 return __xfrm_spi_hash(daddr, spi, proto, family, net->xfrm.state_hmask); 84 return __xfrm_seq_hash(seq, net->xfrm.state_hmask); 152 struct net *net = container_of(work, struct net, xfrm.state_hash_work); 158 nsize = xfrm_hash_new_size(net->xfrm.state_hmask); 181 spin_lock_bh(&net->xfrm.xfrm_state_lock); 182 write_seqcount_begin(&net->xfrm [all...] |
H A D | xfrm_hash.c | 12 #include <linux/xfrm.h>
|
H A D | xfrm_proc.c | 13 #include <net/xfrm.h>
|
H A D | xfrm_interface_bpf.c | 13 #include <net/xfrm.h>
|
/linux-master/net/ipv4/ |
H A D | xfrm4_state.c | 11 #include <net/xfrm.h>
|
H A D | xfrm4_output.c | 14 #include <net/xfrm.h> 20 struct xfrm_state *x = skb_dst(skb)->xfrm;
|
H A D | xfrm4_policy.c | 16 #include <net/xfrm.h> 150 .data = &init_net.xfrm.xfrm4_dst_ops.gc_thresh, 169 table[0].data = &net->xfrm.xfrm4_dst_ops.gc_thresh; 214 memcpy(&net->xfrm.xfrm4_dst_ops, &xfrm4_dst_ops_template, 216 ret = dst_entries_init(&net->xfrm.xfrm4_dst_ops); 222 dst_entries_destroy(&net->xfrm.xfrm4_dst_ops); 230 dst_entries_destroy(&net->xfrm.xfrm4_dst_ops);
|
/linux-master/net/ipv6/ |
H A D | xfrm6_state.c | 15 #include <net/xfrm.h>
|
H A D | xfrm6_policy.c | 20 #include <net/xfrm.h> 141 } while (xdst->u.dst.xfrm); 182 .data = &init_net.xfrm.xfrm6_dst_ops.gc_thresh, 201 table[0].data = &net->xfrm.xfrm6_dst_ops.gc_thresh; 246 memcpy(&net->xfrm.xfrm6_dst_ops, &xfrm6_dst_ops_template, 248 ret = dst_entries_init(&net->xfrm.xfrm6_dst_ops); 254 dst_entries_destroy(&net->xfrm.xfrm6_dst_ops); 262 dst_entries_destroy(&net->xfrm.xfrm6_dst_ops);
|
H A D | xfrm6_output.c | 17 #include <net/xfrm.h> 64 struct xfrm_state *x = dst->xfrm;
|
/linux-master/drivers/staging/octeon/ |
H A D | ethernet-mdio.h | 19 #include <linux/xfrm.h> 20 #include <net/xfrm.h>
|
/linux-master/drivers/net/ethernet/netronome/nfp/nfdk/ |
H A D | ipsec.c | 4 #include <net/xfrm.h>
|
/linux-master/tools/testing/selftests/net/ |
H A D | xfrm_policy.sh | 4 # Check xfrm policy resolution. Topology: 38 ip -net $ns xfrm policy add src $lnet dst $rnet dir out tmpl src $me dst $remote proto esp mode tunnel priority 100 action allow 40 ip -net $ns xfrm policy add src $rnet dst $lnet dir fwd tmpl src $remote dst $me proto esp mode tunnel priority 100 action allow 52 ip -net $ns xfrm state add src $remote dst $me proto esp spi $spi_in enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $rnet dst $lnet 53 ip -net $ns xfrm state add src $me dst $remote proto esp spi $spi_out enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $lnet dst $rnet 75 ip -net $ns xfrm policy add src 10.1.0.0/24 dst 10.0.0.0/24 dir fwd priority 200 action block 78 ip -net $ns xfrm policy add src 10.2.0.0/24 dst 10.0.0.0/24 dir fwd priority 200 action block 81 ip -net $ns xfrm policy add src 10.2.0.0/23 dst 10.0.1.0/24 dir fwd priority 200 action block 107 ip -net $ns xfrm policy add src 10.1.0.0/24 dst 10.0.0.0/23 dir fwd priority 200 action block 112 ip -net $ns xfrm polic [all...] |
H A D | l2tp.sh | 228 run_cmd $host_1 ip xfrm policy add \ 232 run_cmd $host_1 ip xfrm policy add \ 236 run_cmd $host_2 ip xfrm policy add \ 240 run_cmd $host_2 ip xfrm policy add \ 244 ip -netns $host_1 xfrm state add \ 249 ip -netns $host_1 xfrm state add \ 254 ip -netns $host_2 xfrm state add \ 259 ip -netns $host_2 xfrm state add \ 267 run_cmd $host_1 ip -6 xfrm policy add \ 271 run_cmd $host_1 ip -6 xfrm polic [all...] |
H A D | vrf-xfrm-tests.sh | 197 ip -netns ${ns} xfrm ${x} flush 198 ip -6 -netns ${ns} xfrm ${x} flush 216 ip -netns $host1 xfrm policy add \ 221 ip -netns $host2 xfrm policy add \ 226 ip -netns $host1 xfrm policy add \ 231 ip -netns $host2 xfrm policy add \ 237 ip -6 -netns $host1 xfrm policy add \ 242 ip -6 -netns $host2 xfrm policy add \ 247 ip -6 -netns $host1 xfrm policy add \ 252 ip -6 -netns $host2 xfrm polic [all...] |
/linux-master/net/netfilter/ |
H A D | nft_xfrm.c | 16 #include <net/xfrm.h> 182 for (i = 0; dst && dst->xfrm; 187 nft_xfrm_state_get_key(priv, regs, dst->xfrm); 266 const struct nft_xfrm *xfrm; local 273 xfrm = nft_expr_priv(track->regs[priv->dreg].selector); 274 if (priv->key != xfrm->key || 275 priv->dreg != xfrm->dreg || 276 priv->dir != xfrm->dir || 277 priv->spnum != xfrm->spnum) { 300 .name = "xfrm", [all...] |
H A D | xt_policy.c | 11 #include <net/xfrm.h> 90 if (dst->xfrm == NULL) 93 for (i = 0; dst && dst->xfrm; 100 if (match_xfrm_state(dst->xfrm, e, family)) {
|
/linux-master/drivers/net/ethernet/netronome/nfp/nfd3/ |
H A D | ipsec.c | 5 #include <net/xfrm.h>
|
/linux-master/include/net/netns/ |
H A D | xfrm.h | 9 #include <linux/xfrm.h>
|
/linux-master/security/selinux/ |
H A D | Makefile | 22 selinux-$(CONFIG_SECURITY_NETWORK_XFRM) += xfrm.o
|
/linux-master/arch/x86/kvm/vmx/ |
H A D | sgx.c | 148 u64 attributes, xfrm, size; local 162 xfrm = contents->xfrm; 183 (u32)xfrm & ~sgx_12_1->ecx || 184 (u32)(xfrm >> 32) & ~sgx_12_1->edx || 185 xfrm & ~(vcpu->arch.guest_supported_xcr0 | XFEATURE_MASK_FPSSE) || 186 (xfrm & XFEATURE_MASK_FPSSE) != XFEATURE_MASK_FPSSE) {
|
/linux-master/arch/x86/include/asm/ |
H A D | sgx.h | 156 * @xfrm: XSave-Feature Request Mask (subset of XCR0) 177 u64 xfrm; member in struct:sgx_secs 361 * @xfrm: XSave-Feature Request Mask (subset of XCR0) 373 u64 xfrm; member in struct:sgx_sigstruct_body
|
/linux-master/tools/testing/selftests/net/forwarding/ |
H A D | ip6_forward_instats_vrf.sh | 151 ip xfrm policy add dst 2001:1:2::2/128 dir fwd action block 154 ip xfrm policy del dst 2001:1:2::2/128 dir fwd
|