/net/ipv4/ |
D | ip_tunnel.c | 67 static unsigned int ip_tunnel_hash(__be32 key, __be32 remote) in ip_tunnel_hash() argument 69 return hash_32((__force u32)key ^ (__force u32)remote, in ip_tunnel_hash() 154 __be32 remote, __be32 local, in ip_tunnel_lookup() argument 161 hash = ip_tunnel_hash(key, remote); in ip_tunnel_lookup() 166 remote != t->parms.iph.daddr || in ip_tunnel_lookup() 180 if (remote != t->parms.iph.daddr || in ip_tunnel_lookup() 246 __be32 remote; in ip_bucket() local 250 remote = parms->iph.daddr; in ip_bucket() 252 remote = 0; in ip_bucket() 257 h = ip_tunnel_hash(i_key, remote); in ip_bucket() [all …]
|
D | ipmr.c | 795 v->remote = vifc->vifc_rmt_addr.s_addr; in vif_add() 1717 vif->remote, vif->local, in ipmr_queue_xmit() 1764 ip_encap(skb, vif->local, vif->remote); in ipmr_queue_xmit() 2498 vif->flags, vif->local, vif->remote); in ipmr_vif_seq_show()
|
D | Kconfig | 266 flooding". This denial-of-service attack prevents legitimate remote
|
/net/atm/ |
D | proc.c | 226 seq_printf(seq, "%s%s", vcc->remote.sas_addr.pub, in svc_info() 227 *vcc->remote.sas_addr.pub && *vcc->remote.sas_addr.prv ? "+" : ""); in svc_info() 228 if (*vcc->remote.sas_addr.prv) { in svc_info() 232 seq_printf(seq, "%02x", vcc->remote.sas_addr.prv[i]); in svc_info()
|
D | svc.c | 204 vcc->remote = *addr; in svc_connect() 206 sigd_enq(vcc, as_connect, NULL, NULL, &vcc->remote); in svc_connect() 375 new_vcc->remote = msg->svc; in svc_accept() 426 memcpy(addr, peer ? &ATM_SD(sock)->remote : &ATM_SD(sock)->local, in svc_getname() 667 ATM_SD(sock)->remote.sas_family = AF_ATMSVC; in svc_create()
|
D | clip.c | 773 svc_addr(seq, &clip_vcc->vcc->remote); in atmarp_info()
|
D | common.c | 162 memset(&vcc->remote, 0, sizeof(struct sockaddr_atmsvc)); in vcc_create()
|
D | lec.c | 2181 memcpy(to_add->atm_addr, vcc->remote.sas_addr.prv, ATM_ESA_LEN); in lec_mcast_make()
|
/net/ipv6/ |
D | ip6_vti.c | 92 vti6_tnl_lookup(struct net *net, const struct in6_addr *remote, in vti6_tnl_lookup() argument 95 unsigned int hash = HASH(remote, local); in vti6_tnl_lookup() 101 ipv6_addr_equal(remote, &t->parms.raddr) && in vti6_tnl_lookup() 125 const struct in6_addr *remote = &p->raddr; in vti6_tnl_bucket() local 130 if (!ipv6_addr_any(remote) || !ipv6_addr_any(local)) { in vti6_tnl_bucket() 132 h = HASH(remote, local); in vti6_tnl_bucket() 242 const struct in6_addr *remote = &p->raddr; in vti6_locate() local 252 ipv6_addr_equal(remote, &t->parms.raddr)) { in vti6_locate()
|
D | ip6_gre.c | 116 const struct in6_addr *remote, const struct in6_addr *local, in ip6gre_tunnel_lookup() argument 121 unsigned int h0 = HASH_ADDR(remote); in ip6gre_tunnel_lookup() 131 !ipv6_addr_equal(remote, &t->parms.raddr) || in ip6gre_tunnel_lookup() 155 if (!ipv6_addr_equal(remote, &t->parms.raddr) || in ip6gre_tunnel_lookup() 240 const struct in6_addr *remote = &p->raddr; in __ip6gre_bucket() local 247 if (!ipv6_addr_any(remote) && !ipv6_addr_is_multicast(remote)) { in __ip6gre_bucket() 249 h ^= HASH_ADDR(remote); in __ip6gre_bucket() 288 const struct in6_addr *remote = &parms->raddr; in ip6gre_tunnel_find() local 300 ipv6_addr_equal(remote, &t->parms.raddr) && in ip6gre_tunnel_find()
|
D | sit.c | 94 struct net_device *dev, __be32 remote, __be32 local) in ipip6_tunnel_lookup() argument 96 unsigned int h0 = HASH(remote); in ipip6_tunnel_lookup() 103 remote == t->parms.iph.daddr && in ipip6_tunnel_lookup() 109 if (remote == t->parms.iph.daddr && in ipip6_tunnel_lookup() 129 __be32 remote = parms->iph.daddr; in __ipip6_bucket() local 134 if (remote) { in __ipip6_bucket() 136 h ^= HASH(remote); in __ipip6_bucket() 224 __be32 remote = parms->iph.daddr; in ipip6_tunnel_locate() local 236 remote == t->parms.iph.daddr && in ipip6_tunnel_locate()
|
D | ip6_tunnel.c | 181 ip6_tnl_lookup(struct net *net, const struct in6_addr *remote, const struct in6_addr *local) in ip6_tnl_lookup() argument 183 unsigned int hash = HASH(remote, local); in ip6_tnl_lookup() 189 ipv6_addr_equal(remote, &t->parms.raddr) && in ip6_tnl_lookup() 214 const struct in6_addr *remote = &p->raddr; in ip6_tnl_bucket() local 219 if (!ipv6_addr_any(remote) || !ipv6_addr_any(local)) { in ip6_tnl_bucket() 221 h = HASH(remote, local); in ip6_tnl_bucket() 354 const struct in6_addr *remote = &p->raddr; in ip6_tnl_locate() local 364 ipv6_addr_equal(remote, &t->parms.raddr)) { in ip6_tnl_locate()
|
/net/xfrm/ |
D | xfrm_policy.c | 1373 xfrm_get_saddr(struct net *net, xfrm_address_t *local, xfrm_address_t *remote, in xfrm_get_saddr() argument 1381 err = afinfo->get_saddr(net, local, remote, mark); in xfrm_get_saddr() 1401 xfrm_address_t *remote = daddr; in xfrm_tmpl_resolve_one() local 1407 remote = &tmpl->id.daddr; in xfrm_tmpl_resolve_one() 1410 error = xfrm_get_saddr(net, &tmp, remote, in xfrm_tmpl_resolve_one() 1418 x = xfrm_state_find(remote, local, fl, tmpl, policy, &error, family); in xfrm_tmpl_resolve_one() 1422 daddr = remote; in xfrm_tmpl_resolve_one()
|
D | xfrm_user.c | 2163 memcpy(&k->remote, &uk->remote, sizeof(k->remote)); in copy_from_user_migrate() 2262 memcpy(&uk.remote, &k->remote, sizeof(uk.remote)); in copy_to_user_kmaddress()
|
/net/vmw_vsock/ |
D | vmci_transport.c | 201 struct sockaddr_vm *remote) in vmci_transport_packet_get_addresses() argument 204 vsock_addr_init(remote, pkt->dg.src.context, pkt->src_port); in vmci_transport_packet_get_addresses()
|
/net/netfilter/ |
D | Kconfig | 294 SANE is a protocol for remote access to scanners as implemented 1242 that allows to passively match the remote operating system by
|
/net/key/ |
D | af_key.c | 2569 &k.local, &k.remote, &k.family); in pfkey_migrate() 3488 !pfkey_sockaddr_fill(&k->remote, 0, (struct sockaddr *)(sa+socklen), family)) in set_sadb_kmaddress()
|