Searched refs:xfrm (Results 1 - 25 of 158) sorted by relevance

1234567

/linux-master/net/xfrm/
H A Dxfrm_sysctl.c5 #include <net/xfrm.h>
9 net->xfrm.sysctl_aevent_etime = XFRM_AE_ETIME;
10 net->xfrm.sysctl_aevent_rseqth = XFRM_AE_SEQT_SIZE;
11 net->xfrm.sysctl_larval_drop = 1;
12 net->xfrm.sysctl_acq_expires = 30;
54 table[0].data = &net->xfrm.sysctl_aevent_etime;
55 table[1].data = &net->xfrm.sysctl_aevent_rseqth;
56 table[2].data = &net->xfrm.sysctl_larval_drop;
57 table[3].data = &net->xfrm.sysctl_acq_expires;
65 net->xfrm
[all...]
H A Dxfrm_policy.c36 #include <net/xfrm.h>
78 /* xfrm inexact policy search tree:
475 return __idx_hash(index, net->xfrm.policy_idx_hmask);
485 *dbits = net->xfrm.policy_bydst[dir].dbits4;
486 *sbits = net->xfrm.policy_bydst[dir].sbits4;
490 *dbits = net->xfrm.policy_bydst[dir].dbits6;
491 *sbits = net->xfrm.policy_bydst[dir].sbits6;
504 unsigned int hmask = net->xfrm.policy_bydst[dir].hmask;
515 return rcu_dereference_check(net->xfrm.policy_bydst[dir].table,
516 lockdep_is_held(&net->xfrm
2460 xfrm_tmpl_resolve_one(struct xfrm_policy *policy, const struct flowi *fl, struct xfrm_state **xfrm, unsigned short family) argument
2519 xfrm_tmpl_resolve(struct xfrm_policy **pols, int npols, const struct flowi *fl, struct xfrm_state **xfrm, unsigned short family) argument
2629 xfrm_bundle_create(struct xfrm_policy *policy, struct xfrm_state **xfrm, struct xfrm_dst **bundle, int nx, const struct flowi *fl, struct dst_entry *dst) argument
2823 struct xfrm_state *xfrm[XFRM_MAX_DEPTH]; local
4028 const struct xfrm_state *xfrm = dst->xfrm; local
[all...]
H A Dxfrm_state.c19 #include <net/xfrm.h>
36 rcu_dereference_protected((table), lockdep_is_held(&(net)->xfrm.xfrm_state_lock))
64 return __xfrm_dst_hash(daddr, saddr, reqid, family, net->xfrm.state_hmask);
72 return __xfrm_src_hash(daddr, saddr, family, net->xfrm.state_hmask);
79 return __xfrm_spi_hash(daddr, spi, proto, family, net->xfrm.state_hmask);
84 return __xfrm_seq_hash(seq, net->xfrm.state_hmask);
152 struct net *net = container_of(work, struct net, xfrm.state_hash_work);
158 nsize = xfrm_hash_new_size(net->xfrm.state_hmask);
181 spin_lock_bh(&net->xfrm.xfrm_state_lock);
182 write_seqcount_begin(&net->xfrm
[all...]
H A Dxfrm_hash.c12 #include <linux/xfrm.h>
H A Dxfrm_proc.c13 #include <net/xfrm.h>
H A Dxfrm_interface_bpf.c13 #include <net/xfrm.h>
/linux-master/net/ipv4/
H A Dxfrm4_state.c11 #include <net/xfrm.h>
H A Dxfrm4_output.c14 #include <net/xfrm.h>
20 struct xfrm_state *x = skb_dst(skb)->xfrm;
H A Dxfrm4_policy.c16 #include <net/xfrm.h>
150 .data = &init_net.xfrm.xfrm4_dst_ops.gc_thresh,
169 table[0].data = &net->xfrm.xfrm4_dst_ops.gc_thresh;
214 memcpy(&net->xfrm.xfrm4_dst_ops, &xfrm4_dst_ops_template,
216 ret = dst_entries_init(&net->xfrm.xfrm4_dst_ops);
222 dst_entries_destroy(&net->xfrm.xfrm4_dst_ops);
230 dst_entries_destroy(&net->xfrm.xfrm4_dst_ops);
/linux-master/net/ipv6/
H A Dxfrm6_state.c15 #include <net/xfrm.h>
H A Dxfrm6_policy.c20 #include <net/xfrm.h>
141 } while (xdst->u.dst.xfrm);
182 .data = &init_net.xfrm.xfrm6_dst_ops.gc_thresh,
201 table[0].data = &net->xfrm.xfrm6_dst_ops.gc_thresh;
246 memcpy(&net->xfrm.xfrm6_dst_ops, &xfrm6_dst_ops_template,
248 ret = dst_entries_init(&net->xfrm.xfrm6_dst_ops);
254 dst_entries_destroy(&net->xfrm.xfrm6_dst_ops);
262 dst_entries_destroy(&net->xfrm.xfrm6_dst_ops);
H A Dxfrm6_output.c17 #include <net/xfrm.h>
64 struct xfrm_state *x = dst->xfrm;
/linux-master/drivers/staging/octeon/
H A Dethernet-mdio.h19 #include <linux/xfrm.h>
20 #include <net/xfrm.h>
/linux-master/drivers/net/ethernet/netronome/nfp/nfdk/
H A Dipsec.c4 #include <net/xfrm.h>
/linux-master/tools/testing/selftests/net/
H A Dxfrm_policy.sh4 # Check xfrm policy resolution. Topology:
38 ip -net $ns xfrm policy add src $lnet dst $rnet dir out tmpl src $me dst $remote proto esp mode tunnel priority 100 action allow
40 ip -net $ns xfrm policy add src $rnet dst $lnet dir fwd tmpl src $remote dst $me proto esp mode tunnel priority 100 action allow
52 ip -net $ns xfrm state add src $remote dst $me proto esp spi $spi_in enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $rnet dst $lnet
53 ip -net $ns xfrm state add src $me dst $remote proto esp spi $spi_out enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $lnet dst $rnet
75 ip -net $ns xfrm policy add src 10.1.0.0/24 dst 10.0.0.0/24 dir fwd priority 200 action block
78 ip -net $ns xfrm policy add src 10.2.0.0/24 dst 10.0.0.0/24 dir fwd priority 200 action block
81 ip -net $ns xfrm policy add src 10.2.0.0/23 dst 10.0.1.0/24 dir fwd priority 200 action block
107 ip -net $ns xfrm policy add src 10.1.0.0/24 dst 10.0.0.0/23 dir fwd priority 200 action block
112 ip -net $ns xfrm polic
[all...]
H A Dl2tp.sh228 run_cmd $host_1 ip xfrm policy add \
232 run_cmd $host_1 ip xfrm policy add \
236 run_cmd $host_2 ip xfrm policy add \
240 run_cmd $host_2 ip xfrm policy add \
244 ip -netns $host_1 xfrm state add \
249 ip -netns $host_1 xfrm state add \
254 ip -netns $host_2 xfrm state add \
259 ip -netns $host_2 xfrm state add \
267 run_cmd $host_1 ip -6 xfrm policy add \
271 run_cmd $host_1 ip -6 xfrm polic
[all...]
H A Dvrf-xfrm-tests.sh197 ip -netns ${ns} xfrm ${x} flush
198 ip -6 -netns ${ns} xfrm ${x} flush
216 ip -netns $host1 xfrm policy add \
221 ip -netns $host2 xfrm policy add \
226 ip -netns $host1 xfrm policy add \
231 ip -netns $host2 xfrm policy add \
237 ip -6 -netns $host1 xfrm policy add \
242 ip -6 -netns $host2 xfrm policy add \
247 ip -6 -netns $host1 xfrm policy add \
252 ip -6 -netns $host2 xfrm polic
[all...]
/linux-master/net/netfilter/
H A Dnft_xfrm.c16 #include <net/xfrm.h>
182 for (i = 0; dst && dst->xfrm;
187 nft_xfrm_state_get_key(priv, regs, dst->xfrm);
266 const struct nft_xfrm *xfrm; local
273 xfrm = nft_expr_priv(track->regs[priv->dreg].selector);
274 if (priv->key != xfrm->key ||
275 priv->dreg != xfrm->dreg ||
276 priv->dir != xfrm->dir ||
277 priv->spnum != xfrm->spnum) {
300 .name = "xfrm",
[all...]
H A Dxt_policy.c11 #include <net/xfrm.h>
90 if (dst->xfrm == NULL)
93 for (i = 0; dst && dst->xfrm;
100 if (match_xfrm_state(dst->xfrm, e, family)) {
/linux-master/drivers/net/ethernet/netronome/nfp/nfd3/
H A Dipsec.c5 #include <net/xfrm.h>
/linux-master/include/net/netns/
H A Dxfrm.h9 #include <linux/xfrm.h>
/linux-master/security/selinux/
H A DMakefile22 selinux-$(CONFIG_SECURITY_NETWORK_XFRM) += xfrm.o
/linux-master/arch/x86/kvm/vmx/
H A Dsgx.c148 u64 attributes, xfrm, size; local
162 xfrm = contents->xfrm;
183 (u32)xfrm & ~sgx_12_1->ecx ||
184 (u32)(xfrm >> 32) & ~sgx_12_1->edx ||
185 xfrm & ~(vcpu->arch.guest_supported_xcr0 | XFEATURE_MASK_FPSSE) ||
186 (xfrm & XFEATURE_MASK_FPSSE) != XFEATURE_MASK_FPSSE) {
/linux-master/arch/x86/include/asm/
H A Dsgx.h156 * @xfrm: XSave-Feature Request Mask (subset of XCR0)
177 u64 xfrm; member in struct:sgx_secs
361 * @xfrm: XSave-Feature Request Mask (subset of XCR0)
373 u64 xfrm; member in struct:sgx_sigstruct_body
/linux-master/tools/testing/selftests/net/forwarding/
H A Dip6_forward_instats_vrf.sh151 ip xfrm policy add dst 2001:1:2::2/128 dir fwd action block
154 ip xfrm policy del dst 2001:1:2::2/128 dir fwd

Completed in 202 milliseconds

1234567