/net/batman-adv/ |
D | tvlv.c | 69 batadv_tvlv_handler_get(struct batadv_priv *bat_priv, u8 type, u8 version) in batadv_tvlv_handler_get() argument 79 if (tvlv_handler_tmp->version != version) in batadv_tvlv_handler_get() 131 batadv_tvlv_container_get(struct batadv_priv *bat_priv, u8 type, u8 version) in batadv_tvlv_container_get() argument 141 if (tvlv_tmp->tvlv_hdr.version != version) in batadv_tvlv_container_get() 209 u8 type, u8 version) in batadv_tvlv_container_unregister() argument 214 tvlv = batadv_tvlv_container_get(bat_priv, type, version); in batadv_tvlv_container_unregister() 232 u8 type, u8 version, in batadv_tvlv_container_register() argument 244 tvlv_new->tvlv_hdr.version = version; in batadv_tvlv_container_register() 253 tvlv_old = batadv_tvlv_container_get(bat_priv, type, version); in batadv_tvlv_container_register() 338 tvlv_hdr->version = tvlv->tvlv_hdr.version; in batadv_tvlv_container_ogm_append() [all …]
|
D | tvlv.h | 16 u8 type, u8 version, 25 u8 type, u8 version); 37 u8 type, u8 version, u8 flags); 39 u8 type, u8 version); 46 u8 *dst, u8 type, u8 version,
|
/net/netfilter/ |
D | xt_l2tp.c | 41 u8 version; member 54 if ((info->flags & XT_L2TP_VERSION) && (info->version != data->version)) in l2tp_match() 59 ((data->type == XT_L2TP_TYPE_CONTROL) || (data->version == 2)) && in l2tp_match() 104 data.version = (u8) flags & L2TP_HDR_VER; in l2tp_udp_mt() 112 if (data.version == 3) { in l2tp_udp_mt() 120 } else if (data.version == 2) { in l2tp_udp_mt() 165 data.version = 3; in l2tp_ip_mt() 234 if ((info->version < 2) || (info->version > 3)) { in l2tp_mt_check() 236 info->version); in l2tp_mt_check() 240 if (info->version == 2) { in l2tp_mt_check() [all …]
|
D | nft_tunnel.c | 263 int err, version; in nft_tunnel_obj_erspan_init() local 274 version = ntohl(nla_get_be32(tb[NFTA_TUNNEL_KEY_ERSPAN_VERSION])); in nft_tunnel_obj_erspan_init() 275 switch (version) { in nft_tunnel_obj_erspan_init() 297 opts->u.erspan.version = version; in nft_tunnel_obj_erspan_init() 570 htonl(opts->u.erspan.version))) in nft_tunnel_opts_dump() 572 switch (opts->u.erspan.version) { in nft_tunnel_opts_dump()
|
/net/ipv4/ |
D | gre_demux.c | 31 int gre_add_protocol(const struct gre_protocol *proto, u8 version) in gre_add_protocol() argument 33 if (version >= GREPROTO_MAX) in gre_add_protocol() 36 return (cmpxchg((const struct gre_protocol **)&gre_proto[version], NULL, proto) == NULL) ? in gre_add_protocol() 41 int gre_del_protocol(const struct gre_protocol *proto, u8 version) in gre_del_protocol() argument 45 if (version >= GREPROTO_MAX) in gre_del_protocol() 48 ret = (cmpxchg((const struct gre_protocol **)&gre_proto[version], proto, NULL) == proto) ? in gre_del_protocol()
|
D | fou.c | 136 switch (guehdr->version) { in gue_udp_recv() 145 switch (((struct iphdr *)guehdr)->version) { in gue_udp_recv() 339 switch (guehdr->version) { in gue_gro_receive() 343 switch (((struct iphdr *)guehdr)->version) { in gue_gro_receive() 367 if (unlikely(guehdr->control) || guehdr->version != 0 || in gue_gro_receive() 467 switch (guehdr->version) { in gue_gro_complete() 473 switch (((struct iphdr *)guehdr)->version) { in gue_gro_complete() 938 .version = FOU_GENL_VERSION, 1020 guehdr->version = 0; in __gue_build_header() 1140 switch (guehdr->version) { in gue_err() [all …]
|
D | ip_tunnel_core.c | 72 iph->version = 4; in iptunnel_xmit() 233 .version = 4, in iptunnel_pmtud_build_icmp() 325 .version = 6, in iptunnel_pmtud_build_icmpv6() 566 md->version = ver; in ip_tun_parse_opts_erspan() 789 if (nla_put_u8(skb, LWTUNNEL_IP_OPT_ERSPAN_VER, md->version)) in ip_tun_fill_encap_opts_erspan() 792 if (md->version == 1 && in ip_tun_fill_encap_opts_erspan() 796 if (md->version == 2 && in ip_tun_fill_encap_opts_erspan() 885 + (md->version == 1 ? nla_total_size(4) in ip_tun_opts_nlsize() 1070 ip_hdr(skb)->version == 4) in ip_tunnel_parse_protocol() 1074 ipv6_hdr(skb)->version == 6) in ip_tunnel_parse_protocol()
|
/net/smc/ |
D | smc_clc.c | 52 if (hdr->version == SMC_V1) { in smc_clc_msg_prop_valid() 91 if (hdr->version == SMC_V1) { in smc_clc_msg_acc_conf_valid() 391 (clcm->version < SMC_V1) || in smc_clc_wait_msg() 447 int smc_clc_send_decline(struct smc_sock *smc, u32 peer_diag_info, u8 version) in smc_clc_send_decline() argument 458 dclc.hdr.version = version; in smc_clc_send_decline() 459 dclc.os_type = version == SMC_V1 ? 0 : SMC_CLC_OS_LINUX; in smc_clc_send_decline() 509 pclc_base->hdr.version = SMC_V2; in smc_clc_send_proposal() 639 int first_contact, u8 version) in smc_clc_send_confirm_accept() argument 651 clc->hdr.version = version; /* SMC version */ in smc_clc_send_confirm_accept() 664 if (version == SMC_V1) { in smc_clc_send_confirm_accept() [all …]
|
D | smc_clc.h | 69 u8 version : 4, member 75 version : 4; member 330 int smc_clc_send_decline(struct smc_sock *smc, u32 peer_diag_info, u8 version); 333 u8 version); 335 u8 version);
|
D | af_smc.c | 491 if (clc->hdr.version > SMC_V1 && in smcd_conn_save_peer_info() 726 u8 version) in smc_connect_decline_fallback() argument 738 rc = smc_clc_send_decline(smc, reason_code, version); in smc_connect_decline_fallback() 1048 if (aclc->hdr.version == SMC_V2) { in smc_connect_ism() 1079 aclc->hdr.version); in smc_connect_ism() 1107 (aclc->hdr.version == SMC_V1 && in smc_connect_check_aclc() 1109 (aclc->hdr.version == SMC_V2 && in smc_connect_check_aclc() 1119 u8 version = smc_ism_is_v2_capable() ? SMC_V2 : SMC_V1; in __smc_connect() local 1136 version); in __smc_connect() 1141 version); in __smc_connect() [all …]
|
/net/l2tp/ |
D | l2tp_core.c | 360 if (tunnel->version == L2TP_HDR_VER_3) { in l2tp_session_register() 667 if (tunnel->version == L2TP_HDR_VER_2) { in l2tp_recv_common() 696 l2tp_session_set_header_len(session, tunnel->version); in l2tp_recv_common() 717 l2tp_session_set_header_len(session, tunnel->version); in l2tp_recv_common() 729 if (tunnel->version == L2TP_HDR_VER_2) { in l2tp_recv_common() 800 u16 version; in l2tp_udp_recv_core() local 823 version = hdrflags & L2TP_HDR_VER_MASK; in l2tp_udp_recv_core() 824 if (version != tunnel->version) { in l2tp_udp_recv_core() 826 tunnel->name, version, tunnel->version); in l2tp_udp_recv_core() 840 if (tunnel->version == L2TP_HDR_VER_2) { in l2tp_udp_recv_core() [all …]
|
D | trace.h | 59 __field(int, version) 67 __entry->version = tunnel->version; 74 __entry->version,
|
D | l2tp_ppp.c | 555 u8 version; member 574 info->version = 2; in pppol2tp_sockaddr_get_info() 590 info->version = 3; in pppol2tp_sockaddr_get_info() 606 info->version = 2; in pppol2tp_sockaddr_get_info() 622 info->version = 3; in pppol2tp_sockaddr_get_info() 682 info->version, in pppol2tp_tunnel_get() 929 if (tunnel->version == 2 && tunnel->sock->sk_family == AF_INET) { in pppol2tp_getname() 947 } else if (tunnel->version == 2 && tunnel->sock->sk_family == AF_INET6) { in pppol2tp_getname() 965 } else if (tunnel->version == 3 && tunnel->sock->sk_family == AF_INET6) { in pppol2tp_getname() 984 } else if (tunnel->version == 3) { in pppol2tp_getname() [all …]
|
D | l2tp_core.h | 171 int version; /* 2=>L2TPv2, 3=>L2TPv3 */ member 239 int l2tp_tunnel_create(int fd, int version, u32 tunnel_id, 264 void l2tp_session_set_header_len(struct l2tp_session *session, int version);
|
/net/sunrpc/ |
D | svc.c | 916 const u32 version, in __svc_rpcb_register4() argument 939 error = rpcb_v4_register(net, program, version, in __svc_rpcb_register4() 947 error = rpcb_register(net, program, version, protocol, port); in __svc_rpcb_register4() 964 const u32 version, in __svc_rpcb_register6() argument 987 error = rpcb_v4_register(net, program, version, in __svc_rpcb_register6() 1008 const u32 program, const u32 version, in __svc_register() argument 1017 error = __svc_rpcb_register4(net, program, version, in __svc_register() 1022 error = __svc_rpcb_register6(net, program, version, in __svc_register() 1027 trace_svc_register(progname, version, family, protocol, port, error); in __svc_register() 1033 u32 version, int family, in svc_rpcbind_set_version() argument [all …]
|
D | rpcb_clnt.c | 236 .version = RPCBVERS_2, in rpcb_create_local_unix() 290 .version = RPCBVERS_2, in rpcb_create_local_net() 346 int proto, u32 version, in rpcb_create() argument 359 .version = version, in rpcb_create() 565 int rpcb_v4_register(struct net *net, const u32 program, const u32 version, in rpcb_v4_register() argument 570 .r_vers = version, in rpcb_v4_register() 1096 .version = rpcb_version,
|
/net/rds/ |
D | ib_cm.c | 49 static void rds_ib_set_protocol(struct rds_connection *conn, unsigned int version) in rds_ib_set_protocol() argument 51 conn->c_version = version; in rds_ib_set_protocol() 697 u32 version = 0; in rds_ib_protocol_compatible() local 736 version = RDS_PROTOCOL_4_0; in rds_ib_protocol_compatible() 738 version++; in rds_ib_protocol_compatible() 741 version = RDS_PROTOCOL_COMPAT_VERSION; in rds_ib_protocol_compatible() 750 return version; in rds_ib_protocol_compatible() 799 u32 version; in rds_ib_cm_handle_connect() local 803 version = rds_ib_protocol_compatible(event, isv6); in rds_ib_cm_handle_connect() 804 if (!version) { in rds_ib_cm_handle_connect() [all …]
|
/net/9p/ |
D | client.c | 106 int version = -EINVAL; in get_protocol_version() local 109 version = p9_proto_legacy; in get_protocol_version() 112 version = p9_proto_2000u; in get_protocol_version() 115 version = p9_proto_2000L; in get_protocol_version() 121 return version; in get_protocol_version() 938 char *version = NULL; in p9_client_version() local 964 err = p9pdu_readf(&req->rc, c->proto_version, "ds", &msize, &version); in p9_client_version() 971 p9_debug(P9_DEBUG_9P, "<<< RVERSION msize %d %s\n", msize, version); in p9_client_version() 972 if (!strncmp(version, "9P2000.L", 8)) { in p9_client_version() 974 } else if (!strncmp(version, "9P2000.u", 8)) { in p9_client_version() [all …]
|
/net/tls/ |
D | tls_main.c | 502 if (crypto_info->version != TLS_1_2_VERSION && in do_tls_setsockopt_conf() 503 crypto_info->version != TLS_1_3_VERSION) { in do_tls_setsockopt_conf() 510 if (alt_crypto_info->version != crypto_info->version || in do_tls_setsockopt_conf() 810 u16 version, cipher_type; in tls_get_info() local 825 version = ctx->prot_info.version; in tls_get_info() 826 if (version) { in tls_get_info() 827 err = nla_put_u16(skb, TLS_INFO_VERSION, version); in tls_get_info()
|
/net/wireless/ |
D | ethtool.c | 18 strlcpy(info->version, init_utsname()->release, sizeof(info->version)); in cfg80211_get_drvinfo()
|
/net/rxrpc/ |
D | rxkad.c | 743 challenge.version = htonl(2); in rxkad_issue_challenge() 901 u32 version, nonce, min_level, abort_code; in rxkad_respond_to_challenge() local 922 version = ntohl(challenge.version); in rxkad_respond_to_challenge() 927 sp->hdr.serial, version, nonce, min_level); in rxkad_respond_to_challenge() 931 if (version != RXKAD_VERSION) in rxkad_respond_to_challenge() 946 resp->version = htonl(RXKAD_VERSION); in rxkad_respond_to_challenge() 1169 u32 abort_code, version, kvno, ticket_len, level; in rxkad_verify_response() local 1206 version = ntohl(response->version); in rxkad_verify_response() 1210 sp->hdr.serial, version, kvno, ticket_len); in rxkad_verify_response() 1214 if (version != RXKAD_VERSION) in rxkad_verify_response()
|
D | protocol.h | 157 __be32 version; /* version of this challenge type */ member 168 __be32 version; /* version of this response type */ member
|
/net/bluetooth/ |
D | Kconfig | 52 available with Bluetooth version 1.0b or later and support 54 version 2.0 or later. 70 available with Bluetooth version 3.0 or later. 78 layer available with Bluetooth version 4.0 or later.
|
/net/xfrm/ |
D | xfrm_inout.h | 45 iph->version = 6; in xfrm6_beet_make_header() 60 iph->version = 4; in xfrm4_beet_make_header()
|
/net/dns_resolver/ |
D | dns_key.c | 111 kenter("[%u,%u],%u", v1->hdr.content, v1->hdr.version, datalen); in dns_resolver_preparse() 119 if (v1->hdr.version != 1) { in dns_resolver_preparse() 122 v1->hdr.version); in dns_resolver_preparse()
|