Home
last modified time | relevance | path

Searched refs:sel (Results 1 – 21 of 21) sorted by relevance

/net/ipv6/
Dmip6.c203 struct xfrm_selector sel; in mip6_destopt_reject() local
226 memset(&sel, 0, sizeof(sel)); in mip6_destopt_reject()
227 memcpy(&sel.daddr, (xfrm_address_t *)&ipv6_hdr(skb)->daddr, in mip6_destopt_reject()
228 sizeof(sel.daddr)); in mip6_destopt_reject()
229 sel.prefixlen_d = 128; in mip6_destopt_reject()
230 memcpy(&sel.saddr, (xfrm_address_t *)&ipv6_hdr(skb)->saddr, in mip6_destopt_reject()
231 sizeof(sel.saddr)); in mip6_destopt_reject()
232 sel.prefixlen_s = 128; in mip6_destopt_reject()
233 sel.family = AF_INET6; in mip6_destopt_reject()
234 sel.proto = fl6->flowi6_proto; in mip6_destopt_reject()
[all …]
Dipcomp6.c89 memcpy(&t->sel, &x->sel, sizeof(t->sel)); in ipcomp6_tunnel_create()
Dipv6_sockglue.c58 int ip6_ra_control(struct sock *sk, int sel) in ip6_ra_control() argument
66 new_ra = (sel >= 0) ? kmalloc(sizeof(*new_ra), GFP_KERNEL) : NULL; in ip6_ra_control()
67 if (sel >= 0 && !new_ra) in ip6_ra_control()
73 if (sel >= 0) { in ip6_ra_control()
92 new_ra->sel = sel; in ip6_ra_control()
Dip6_output.c369 static int ip6_call_ra_chain(struct sk_buff *skb, int sel) in ip6_call_ra_chain() argument
377 if (sk && ra->sel == sel && in ip6_call_ra_chain()
Desp6.c875 if (x->sel.family != AF_INET6) in esp6_init_state()
Dip6_vti.c361 if (x->sel.family == AF_UNSPEC) { in vti6_rcv_cb()
/net/sched/
Dcls_u32.c66 struct tc_u32_sel sel; member
95 const struct tc_u32_sel *sel, in u32_hash_fold() argument
98 unsigned int h = ntohl(key & sel->hmask) >> fshift; in u32_hash_fold()
116 int sel = 0; in u32_classify() local
123 n = rcu_dereference_bh(ht->ht[sel]); in u32_classify()
127 struct tc_u32_key *key = n->sel.keys; in u32_classify()
148 for (i = n->sel.nkeys; i > 0; i--, key++) { in u32_classify()
171 if (n->sel.flags & TC_U32_TERMINAL) { in u32_classify()
201 sel = 0; in u32_classify()
205 data = skb_header_pointer(skb, off + n->sel.hoff, 4, in u32_classify()
[all …]
/net/xfrm/
Dxfrm_hash.h139 static inline unsigned int __sel_hash(const struct xfrm_selector *sel, in __sel_hash() argument
143 const xfrm_address_t *daddr = &sel->daddr; in __sel_hash()
144 const xfrm_address_t *saddr = &sel->saddr; in __sel_hash()
149 if (sel->prefixlen_d < dbits || in __sel_hash()
150 sel->prefixlen_s < sbits) in __sel_hash()
157 if (sel->prefixlen_d < dbits || in __sel_hash()
158 sel->prefixlen_s < sbits) in __sel_hash()
Dxfrm_state.c852 __xfrm4_init_tempsel(struct xfrm_selector *sel, const struct flowi *fl) in __xfrm4_init_tempsel() argument
856 sel->daddr.a4 = fl4->daddr; in __xfrm4_init_tempsel()
857 sel->saddr.a4 = fl4->saddr; in __xfrm4_init_tempsel()
858 sel->dport = xfrm_flowi_dport(fl, &fl4->uli); in __xfrm4_init_tempsel()
859 sel->dport_mask = htons(0xffff); in __xfrm4_init_tempsel()
860 sel->sport = xfrm_flowi_sport(fl, &fl4->uli); in __xfrm4_init_tempsel()
861 sel->sport_mask = htons(0xffff); in __xfrm4_init_tempsel()
862 sel->family = AF_INET; in __xfrm4_init_tempsel()
863 sel->prefixlen_d = 32; in __xfrm4_init_tempsel()
864 sel->prefixlen_s = 32; in __xfrm4_init_tempsel()
[all …]
Dxfrm_policy.c200 __xfrm4_selector_match(const struct xfrm_selector *sel, const struct flowi *fl) in __xfrm4_selector_match() argument
204 return addr4_match(fl4->daddr, sel->daddr.a4, sel->prefixlen_d) && in __xfrm4_selector_match()
205 addr4_match(fl4->saddr, sel->saddr.a4, sel->prefixlen_s) && in __xfrm4_selector_match()
206 !((xfrm_flowi_dport(fl, &fl4->uli) ^ sel->dport) & sel->dport_mask) && in __xfrm4_selector_match()
207 !((xfrm_flowi_sport(fl, &fl4->uli) ^ sel->sport) & sel->sport_mask) && in __xfrm4_selector_match()
208 (fl4->flowi4_proto == sel->proto || !sel->proto) && in __xfrm4_selector_match()
209 (fl4->flowi4_oif == sel->ifindex || !sel->ifindex); in __xfrm4_selector_match()
213 __xfrm6_selector_match(const struct xfrm_selector *sel, const struct flowi *fl) in __xfrm6_selector_match() argument
217 return addr_match(&fl6->daddr, &sel->daddr, sel->prefixlen_d) && in __xfrm6_selector_match()
218 addr_match(&fl6->saddr, &sel->saddr, sel->prefixlen_s) && in __xfrm6_selector_match()
[all …]
Dxfrm_user.c170 switch (p->sel.family) { in verify_newsa_info()
175 if (p->sel.prefixlen_d > 32 || p->sel.prefixlen_s > 32) in verify_newsa_info()
182 if (p->sel.prefixlen_d > 128 || p->sel.prefixlen_s > 128) in verify_newsa_info()
497 memcpy(&x->sel, &p->sel, sizeof(x->sel)); in copy_from_user_state()
507 if (!x->sel.family && !(p->flags & XFRM_STATE_AF_UNSPEC)) in copy_from_user_state()
508 x->sel.family = p->family; in copy_from_user_state()
791 memcpy(&p->sel, &x->sel, sizeof(p->sel)); in copy_to_user_state()
1469 switch (p->sel.family) { in verify_newpolicy_info()
1471 if (p->sel.prefixlen_d > 32 || p->sel.prefixlen_s > 32) in verify_newpolicy_info()
1478 if (p->sel.prefixlen_d > 128 || p->sel.prefixlen_s > 128) in verify_newpolicy_info()
[all …]
Dxfrm_input.c208 iph->daddr = x->sel.daddr.a4; in xfrm4_remove_beet_encap()
209 iph->saddr = x->sel.saddr.a4; in xfrm4_remove_beet_encap()
310 ip6h->daddr = x->sel.daddr.in6; in xfrm6_remove_beet_encap()
311 ip6h->saddr = x->sel.saddr.in6; in xfrm6_remove_beet_encap()
366 if (x->sel.family == AF_UNSPEC) { in xfrm_prepare_input()
674 if (x->sel.family == AF_UNSPEC) { in xfrm_input()
Dxfrm_output.c155 if (x->sel.family != AF_INET6) in xfrm4_beet_encap_add()
283 if (x->sel.family != AF_INET6) in xfrm6_beet_encap_add()
623 if (x->sel.family == AF_UNSPEC) in xfrm_inner_extract_output()
Dxfrm_compat.c24 struct xfrm_selector sel; member
33 struct xfrm_selector sel; member
48 struct xfrm_selector sel; member
Dxfrm_interface_core.c233 if (x->sel.family == AF_UNSPEC) { in xfrmi_rcv_cb()
/net/key/
Daf_key.c805 if (!xfrm_addr_equal(&x->sel.saddr, &x->props.saddr, x->props.family)) in __pfkey_xfrm_state2msg()
948 if (!xfrm_addr_equal(&x->sel.saddr, &x->props.saddr, in __pfkey_xfrm_state2msg()
957 pfkey_proto_from_xfrm(x->sel.proto); in __pfkey_xfrm_state2msg()
958 addr->sadb_address_prefixlen = x->sel.prefixlen_s; in __pfkey_xfrm_state2msg()
961 pfkey_sockaddr_fill(&x->sel.saddr, x->sel.sport, in __pfkey_xfrm_state2msg()
1257 x->sel.family = pfkey_sadb_addr2xfrm_addr(addr, &x->sel.saddr); in pfkey_msg2xfrm_state()
1258 x->sel.prefixlen_s = addr->sadb_address_prefixlen; in pfkey_msg2xfrm_state()
1261 if (!x->sel.family) in pfkey_msg2xfrm_state()
1262 x->sel.family = x->props.family; in pfkey_msg2xfrm_state()
2372 struct xfrm_selector sel; in pfkey_spddelete() local
[all …]
/net/ipv4/
Dipcomp.c68 memcpy(&t->sel, &x->sel, sizeof(t->sel)); in ipcomp_tunnel_create()
Dip_vti.c147 if (x->sel.family == AF_UNSPEC) { in vti_rcv_cb()
Desp4.c977 else if (x->props.mode == XFRM_MODE_BEET && x->sel.family != AF_INET6) in esp_init_state()
/net/tipc/
Dnode.h95 int tipc_node_get_mtu(struct net *net, u32 addr, u32 sel, bool connected);
Dnode.c179 static struct tipc_link *node_active_link(struct tipc_node *n, int sel) in node_active_link() argument
181 int bearer_id = n->active_links[sel & 1]; in node_active_link()
189 int tipc_node_get_mtu(struct net *net, u32 addr, u32 sel, bool connected) in tipc_node_get_mtu() argument
207 bearer_id = n->active_links[sel & 1]; in tipc_node_get_mtu()