Home
last modified time | relevance | path

Searched refs:version (Results 1 – 25 of 169) sorted by relevance

1234567

/net/batman-adv/
Dtvlv.c69 batadv_tvlv_handler_get(struct batadv_priv *bat_priv, u8 type, u8 version) in batadv_tvlv_handler_get() argument
79 if (tvlv_handler_tmp->version != version) in batadv_tvlv_handler_get()
131 batadv_tvlv_container_get(struct batadv_priv *bat_priv, u8 type, u8 version) in batadv_tvlv_container_get() argument
141 if (tvlv_tmp->tvlv_hdr.version != version) in batadv_tvlv_container_get()
209 u8 type, u8 version) in batadv_tvlv_container_unregister() argument
214 tvlv = batadv_tvlv_container_get(bat_priv, type, version); in batadv_tvlv_container_unregister()
232 u8 type, u8 version, in batadv_tvlv_container_register() argument
244 tvlv_new->tvlv_hdr.version = version; in batadv_tvlv_container_register()
253 tvlv_old = batadv_tvlv_container_get(bat_priv, type, version); in batadv_tvlv_container_register()
338 tvlv_hdr->version = tvlv->tvlv_hdr.version; in batadv_tvlv_container_ogm_append()
[all …]
Dtvlv.h16 u8 type, u8 version,
25 u8 type, u8 version);
37 u8 type, u8 version, u8 flags);
39 u8 type, u8 version);
46 u8 *dst, u8 type, u8 version,
/net/netfilter/
Dxt_l2tp.c41 u8 version; member
54 if ((info->flags & XT_L2TP_VERSION) && (info->version != data->version)) in l2tp_match()
59 ((data->type == XT_L2TP_TYPE_CONTROL) || (data->version == 2)) && in l2tp_match()
104 data.version = (u8) flags & L2TP_HDR_VER; in l2tp_udp_mt()
112 if (data.version == 3) { in l2tp_udp_mt()
120 } else if (data.version == 2) { in l2tp_udp_mt()
165 data.version = 3; in l2tp_ip_mt()
234 if ((info->version < 2) || (info->version > 3)) { in l2tp_mt_check()
236 info->version); in l2tp_mt_check()
240 if (info->version == 2) { in l2tp_mt_check()
[all …]
Dnft_tunnel.c263 int err, version; in nft_tunnel_obj_erspan_init() local
274 version = ntohl(nla_get_be32(tb[NFTA_TUNNEL_KEY_ERSPAN_VERSION])); in nft_tunnel_obj_erspan_init()
275 switch (version) { in nft_tunnel_obj_erspan_init()
297 opts->u.erspan.version = version; in nft_tunnel_obj_erspan_init()
570 htonl(opts->u.erspan.version))) in nft_tunnel_opts_dump()
572 switch (opts->u.erspan.version) { in nft_tunnel_opts_dump()
/net/ipv4/
Dgre_demux.c31 int gre_add_protocol(const struct gre_protocol *proto, u8 version) in gre_add_protocol() argument
33 if (version >= GREPROTO_MAX) in gre_add_protocol()
36 return (cmpxchg((const struct gre_protocol **)&gre_proto[version], NULL, proto) == NULL) ? in gre_add_protocol()
41 int gre_del_protocol(const struct gre_protocol *proto, u8 version) in gre_del_protocol() argument
45 if (version >= GREPROTO_MAX) in gre_del_protocol()
48 ret = (cmpxchg((const struct gre_protocol **)&gre_proto[version], proto, NULL) == proto) ? in gre_del_protocol()
Dfou.c136 switch (guehdr->version) { in gue_udp_recv()
145 switch (((struct iphdr *)guehdr)->version) { in gue_udp_recv()
339 switch (guehdr->version) { in gue_gro_receive()
343 switch (((struct iphdr *)guehdr)->version) { in gue_gro_receive()
367 if (unlikely(guehdr->control) || guehdr->version != 0 || in gue_gro_receive()
467 switch (guehdr->version) { in gue_gro_complete()
473 switch (((struct iphdr *)guehdr)->version) { in gue_gro_complete()
938 .version = FOU_GENL_VERSION,
1020 guehdr->version = 0; in __gue_build_header()
1140 switch (guehdr->version) { in gue_err()
[all …]
Dip_tunnel_core.c72 iph->version = 4; in iptunnel_xmit()
233 .version = 4, in iptunnel_pmtud_build_icmp()
325 .version = 6, in iptunnel_pmtud_build_icmpv6()
566 md->version = ver; in ip_tun_parse_opts_erspan()
789 if (nla_put_u8(skb, LWTUNNEL_IP_OPT_ERSPAN_VER, md->version)) in ip_tun_fill_encap_opts_erspan()
792 if (md->version == 1 && in ip_tun_fill_encap_opts_erspan()
796 if (md->version == 2 && in ip_tun_fill_encap_opts_erspan()
885 + (md->version == 1 ? nla_total_size(4) in ip_tun_opts_nlsize()
1070 ip_hdr(skb)->version == 4) in ip_tunnel_parse_protocol()
1074 ipv6_hdr(skb)->version == 6) in ip_tunnel_parse_protocol()
/net/smc/
Dsmc_clc.c52 if (hdr->version == SMC_V1) { in smc_clc_msg_prop_valid()
91 if (hdr->version == SMC_V1) { in smc_clc_msg_acc_conf_valid()
391 (clcm->version < SMC_V1) || in smc_clc_wait_msg()
447 int smc_clc_send_decline(struct smc_sock *smc, u32 peer_diag_info, u8 version) in smc_clc_send_decline() argument
458 dclc.hdr.version = version; in smc_clc_send_decline()
459 dclc.os_type = version == SMC_V1 ? 0 : SMC_CLC_OS_LINUX; in smc_clc_send_decline()
509 pclc_base->hdr.version = SMC_V2; in smc_clc_send_proposal()
639 int first_contact, u8 version) in smc_clc_send_confirm_accept() argument
651 clc->hdr.version = version; /* SMC version */ in smc_clc_send_confirm_accept()
664 if (version == SMC_V1) { in smc_clc_send_confirm_accept()
[all …]
Dsmc_clc.h69 u8 version : 4, member
75 version : 4; member
330 int smc_clc_send_decline(struct smc_sock *smc, u32 peer_diag_info, u8 version);
333 u8 version);
335 u8 version);
Daf_smc.c491 if (clc->hdr.version > SMC_V1 && in smcd_conn_save_peer_info()
726 u8 version) in smc_connect_decline_fallback() argument
738 rc = smc_clc_send_decline(smc, reason_code, version); in smc_connect_decline_fallback()
1048 if (aclc->hdr.version == SMC_V2) { in smc_connect_ism()
1079 aclc->hdr.version); in smc_connect_ism()
1107 (aclc->hdr.version == SMC_V1 && in smc_connect_check_aclc()
1109 (aclc->hdr.version == SMC_V2 && in smc_connect_check_aclc()
1119 u8 version = smc_ism_is_v2_capable() ? SMC_V2 : SMC_V1; in __smc_connect() local
1136 version); in __smc_connect()
1141 version); in __smc_connect()
[all …]
/net/l2tp/
Dl2tp_core.c360 if (tunnel->version == L2TP_HDR_VER_3) { in l2tp_session_register()
667 if (tunnel->version == L2TP_HDR_VER_2) { in l2tp_recv_common()
696 l2tp_session_set_header_len(session, tunnel->version); in l2tp_recv_common()
717 l2tp_session_set_header_len(session, tunnel->version); in l2tp_recv_common()
729 if (tunnel->version == L2TP_HDR_VER_2) { in l2tp_recv_common()
800 u16 version; in l2tp_udp_recv_core() local
823 version = hdrflags & L2TP_HDR_VER_MASK; in l2tp_udp_recv_core()
824 if (version != tunnel->version) { in l2tp_udp_recv_core()
826 tunnel->name, version, tunnel->version); in l2tp_udp_recv_core()
840 if (tunnel->version == L2TP_HDR_VER_2) { in l2tp_udp_recv_core()
[all …]
Dtrace.h59 __field(int, version)
67 __entry->version = tunnel->version;
74 __entry->version,
Dl2tp_ppp.c555 u8 version; member
574 info->version = 2; in pppol2tp_sockaddr_get_info()
590 info->version = 3; in pppol2tp_sockaddr_get_info()
606 info->version = 2; in pppol2tp_sockaddr_get_info()
622 info->version = 3; in pppol2tp_sockaddr_get_info()
682 info->version, in pppol2tp_tunnel_get()
929 if (tunnel->version == 2 && tunnel->sock->sk_family == AF_INET) { in pppol2tp_getname()
947 } else if (tunnel->version == 2 && tunnel->sock->sk_family == AF_INET6) { in pppol2tp_getname()
965 } else if (tunnel->version == 3 && tunnel->sock->sk_family == AF_INET6) { in pppol2tp_getname()
984 } else if (tunnel->version == 3) { in pppol2tp_getname()
[all …]
Dl2tp_core.h171 int version; /* 2=>L2TPv2, 3=>L2TPv3 */ member
239 int l2tp_tunnel_create(int fd, int version, u32 tunnel_id,
264 void l2tp_session_set_header_len(struct l2tp_session *session, int version);
/net/sunrpc/
Dsvc.c916 const u32 version, in __svc_rpcb_register4() argument
939 error = rpcb_v4_register(net, program, version, in __svc_rpcb_register4()
947 error = rpcb_register(net, program, version, protocol, port); in __svc_rpcb_register4()
964 const u32 version, in __svc_rpcb_register6() argument
987 error = rpcb_v4_register(net, program, version, in __svc_rpcb_register6()
1008 const u32 program, const u32 version, in __svc_register() argument
1017 error = __svc_rpcb_register4(net, program, version, in __svc_register()
1022 error = __svc_rpcb_register6(net, program, version, in __svc_register()
1027 trace_svc_register(progname, version, family, protocol, port, error); in __svc_register()
1033 u32 version, int family, in svc_rpcbind_set_version() argument
[all …]
Drpcb_clnt.c236 .version = RPCBVERS_2, in rpcb_create_local_unix()
290 .version = RPCBVERS_2, in rpcb_create_local_net()
346 int proto, u32 version, in rpcb_create() argument
359 .version = version, in rpcb_create()
565 int rpcb_v4_register(struct net *net, const u32 program, const u32 version, in rpcb_v4_register() argument
570 .r_vers = version, in rpcb_v4_register()
1096 .version = rpcb_version,
/net/rds/
Dib_cm.c49 static void rds_ib_set_protocol(struct rds_connection *conn, unsigned int version) in rds_ib_set_protocol() argument
51 conn->c_version = version; in rds_ib_set_protocol()
697 u32 version = 0; in rds_ib_protocol_compatible() local
736 version = RDS_PROTOCOL_4_0; in rds_ib_protocol_compatible()
738 version++; in rds_ib_protocol_compatible()
741 version = RDS_PROTOCOL_COMPAT_VERSION; in rds_ib_protocol_compatible()
750 return version; in rds_ib_protocol_compatible()
799 u32 version; in rds_ib_cm_handle_connect() local
803 version = rds_ib_protocol_compatible(event, isv6); in rds_ib_cm_handle_connect()
804 if (!version) { in rds_ib_cm_handle_connect()
[all …]
/net/9p/
Dclient.c106 int version = -EINVAL; in get_protocol_version() local
109 version = p9_proto_legacy; in get_protocol_version()
112 version = p9_proto_2000u; in get_protocol_version()
115 version = p9_proto_2000L; in get_protocol_version()
121 return version; in get_protocol_version()
938 char *version = NULL; in p9_client_version() local
964 err = p9pdu_readf(&req->rc, c->proto_version, "ds", &msize, &version); in p9_client_version()
971 p9_debug(P9_DEBUG_9P, "<<< RVERSION msize %d %s\n", msize, version); in p9_client_version()
972 if (!strncmp(version, "9P2000.L", 8)) { in p9_client_version()
974 } else if (!strncmp(version, "9P2000.u", 8)) { in p9_client_version()
[all …]
/net/tls/
Dtls_main.c502 if (crypto_info->version != TLS_1_2_VERSION && in do_tls_setsockopt_conf()
503 crypto_info->version != TLS_1_3_VERSION) { in do_tls_setsockopt_conf()
510 if (alt_crypto_info->version != crypto_info->version || in do_tls_setsockopt_conf()
810 u16 version, cipher_type; in tls_get_info() local
825 version = ctx->prot_info.version; in tls_get_info()
826 if (version) { in tls_get_info()
827 err = nla_put_u16(skb, TLS_INFO_VERSION, version); in tls_get_info()
/net/wireless/
Dethtool.c18 strlcpy(info->version, init_utsname()->release, sizeof(info->version)); in cfg80211_get_drvinfo()
/net/rxrpc/
Drxkad.c743 challenge.version = htonl(2); in rxkad_issue_challenge()
901 u32 version, nonce, min_level, abort_code; in rxkad_respond_to_challenge() local
922 version = ntohl(challenge.version); in rxkad_respond_to_challenge()
927 sp->hdr.serial, version, nonce, min_level); in rxkad_respond_to_challenge()
931 if (version != RXKAD_VERSION) in rxkad_respond_to_challenge()
946 resp->version = htonl(RXKAD_VERSION); in rxkad_respond_to_challenge()
1169 u32 abort_code, version, kvno, ticket_len, level; in rxkad_verify_response() local
1206 version = ntohl(response->version); in rxkad_verify_response()
1210 sp->hdr.serial, version, kvno, ticket_len); in rxkad_verify_response()
1214 if (version != RXKAD_VERSION) in rxkad_verify_response()
Dprotocol.h157 __be32 version; /* version of this challenge type */ member
168 __be32 version; /* version of this response type */ member
/net/bluetooth/
DKconfig52 available with Bluetooth version 1.0b or later and support
54 version 2.0 or later.
70 available with Bluetooth version 3.0 or later.
78 layer available with Bluetooth version 4.0 or later.
/net/xfrm/
Dxfrm_inout.h45 iph->version = 6; in xfrm6_beet_make_header()
60 iph->version = 4; in xfrm4_beet_make_header()
/net/dns_resolver/
Ddns_key.c111 kenter("[%u,%u],%u", v1->hdr.content, v1->hdr.version, datalen); in dns_resolver_preparse()
119 if (v1->hdr.version != 1) { in dns_resolver_preparse()
122 v1->hdr.version); in dns_resolver_preparse()

1234567