/net/ipv4/ |
D | ipip.c | 140 __be32 remote, __be32 local) in ipip_tunnel_lookup() argument 142 unsigned h0 = HASH(remote); in ipip_tunnel_lookup() 149 remote == t->parms.iph.daddr && (t->dev->flags&IFF_UP)) in ipip_tunnel_lookup() 153 if (remote == t->parms.iph.daddr && (t->dev->flags&IFF_UP)) in ipip_tunnel_lookup() 168 __be32 remote = parms->iph.daddr; in __ipip_bucket() local 173 if (remote) { in __ipip_bucket() 175 h ^= HASH(remote); in __ipip_bucket() 217 __be32 remote = parms->iph.daddr; in ipip_tunnel_locate() local 225 if (local == t->parms.iph.saddr && remote == t->parms.iph.daddr) in ipip_tunnel_locate()
|
D | ip_gre.c | 168 __be32 remote, __be32 local, in ipgre_tunnel_lookup() argument 171 unsigned h0 = HASH(remote); in ipgre_tunnel_lookup() 180 if (local == t->parms.iph.saddr && remote == t->parms.iph.daddr) { in ipgre_tunnel_lookup() 191 if (remote == t->parms.iph.daddr) { in ipgre_tunnel_lookup() 234 __be32 remote = parms->iph.daddr; in __ipgre_bucket() local 242 if (remote && !ipv4_is_multicast(remote)) { in __ipgre_bucket() 244 h ^= HASH(remote); in __ipgre_bucket() 284 __be32 remote = parms->iph.daddr; in ipgre_tunnel_find() local 292 remote == t->parms.iph.daddr && in ipgre_tunnel_find()
|
D | ipmr.c | 495 v->remote = vifc->vifc_rmt_addr.s_addr; in vif_add() 1232 { .daddr = vif->remote, in ipmr_queue_xmit() 1279 ip_encap(skb, vif->local, vif->remote); in ipmr_queue_xmit() 1730 vif->flags, vif->local, vif->remote); in ipmr_vif_seq_show()
|
D | Kconfig | 298 flooding". This denial-of-service attack prevents legitimate remote
|
/net/atm/ |
D | proc.c | 221 seq_printf(seq, "%s%s", vcc->remote.sas_addr.pub, in svc_info() 222 *vcc->remote.sas_addr.pub && *vcc->remote.sas_addr.prv ? "+" : ""); in svc_info() 223 if (*vcc->remote.sas_addr.prv) { in svc_info() 227 seq_printf(seq, "%02x", vcc->remote.sas_addr.prv[i]); in svc_info()
|
D | svc.c | 201 vcc->remote = *addr; in svc_connect() 204 sigd_enq(vcc,as_connect,NULL,NULL,&vcc->remote); in svc_connect() 374 new_vcc->remote = msg->svc; in svc_accept() 423 memcpy(addr,peer ? &ATM_SD(sock)->remote : &ATM_SD(sock)->local, in svc_getname() 664 ATM_SD(sock)->remote.sas_family = AF_ATMSVC; in svc_create()
|
D | clip.c | 843 svc_addr(seq, &clip_vcc->vcc->remote); in atmarp_info()
|
D | common.c | 146 memset(&vcc->remote,0,sizeof(struct sockaddr_atmsvc)); in vcc_create()
|
D | lec.c | 2366 memcpy(to_add->atm_addr, vcc->remote.sas_addr.prv, ATM_ESA_LEN); in lec_mcast_make()
|
/net/ipv6/ |
D | sit.c | 83 __be32 remote, __be32 local) in ipip6_tunnel_lookup() argument 85 unsigned h0 = HASH(remote); in ipip6_tunnel_lookup() 92 remote == t->parms.iph.daddr && (t->dev->flags&IFF_UP)) in ipip6_tunnel_lookup() 96 if (remote == t->parms.iph.daddr && (t->dev->flags&IFF_UP)) in ipip6_tunnel_lookup() 111 __be32 remote = parms->iph.daddr; in __ipip6_bucket() local 116 if (remote) { in __ipip6_bucket() 118 h ^= HASH(remote); in __ipip6_bucket() 160 __be32 remote = parms->iph.daddr; in ipip6_tunnel_locate() local 168 if (local == t->parms.iph.saddr && remote == t->parms.iph.daddr) in ipip6_tunnel_locate()
|
D | ip6_tunnel.c | 134 ip6_tnl_lookup(struct net *net, struct in6_addr *remote, struct in6_addr *local) in ip6_tnl_lookup() argument 136 unsigned h0 = HASH(remote); in ip6_tnl_lookup() 143 ipv6_addr_equal(remote, &t->parms.raddr) && in ip6_tnl_lookup() 167 struct in6_addr *remote = &p->raddr; in ip6_tnl_bucket() local 172 if (!ipv6_addr_any(remote) || !ipv6_addr_any(local)) { in ip6_tnl_bucket() 174 h = HASH(remote) ^ HASH(local); in ip6_tnl_bucket() 285 struct in6_addr *remote = &p->raddr; in ip6_tnl_locate() local 292 ipv6_addr_equal(remote, &t->parms.raddr)) in ip6_tnl_locate()
|
/net/xfrm/ |
D | xfrm_policy.c | 1169 xfrm_get_saddr(struct net *net, xfrm_address_t *local, xfrm_address_t *remote, in xfrm_get_saddr() argument 1177 err = afinfo->get_saddr(net, local, remote); in xfrm_get_saddr() 1198 xfrm_address_t *remote = daddr; in xfrm_tmpl_resolve_one() local 1204 remote = &tmpl->id.daddr; in xfrm_tmpl_resolve_one() 1208 error = xfrm_get_saddr(net, &tmp, remote, family); in xfrm_tmpl_resolve_one() 1215 x = xfrm_state_find(remote, local, fl, tmpl, policy, &error, family); in xfrm_tmpl_resolve_one() 1219 daddr = remote; in xfrm_tmpl_resolve_one()
|
D | xfrm_user.c | 1748 memcpy(&k->remote, &uk->remote, sizeof(k->remote)); in copy_from_user_migrate() 1842 memcpy(&uk.remote, &k->remote, sizeof(uk.remote)); in copy_to_user_kmaddress()
|
/net/key/ |
D | af_key.c | 2513 &k.local, &k.remote, &k.family); in pfkey_migrate() 3386 !pfkey_sockaddr_fill(&k->remote, 0, (struct sockaddr *)(sa+socklen), family)) in set_sadb_kmaddress()
|
/net/netfilter/ |
D | Kconfig | 239 SANE is a protocol for remote access to scanners as implemented
|