Searched refs:xfrm_decode_session (Results 1 – 10 of 10) sorted by relevance
/linux-4.4.14/net/ipv6/ |
D | netfilter.c | 50 xfrm_decode_session(skb, flowi6_to_flowi(&fl6), AF_INET6) == 0) { in ip6_route_me_harder()
|
D | ip6_vti.c | 526 xfrm_decode_session(skb, &fl, AF_INET6); in vti6_tnl_xmit() 530 xfrm_decode_session(skb, &fl, AF_INET); in vti6_tnl_xmit()
|
/linux-4.4.14/net/ipv4/ |
D | netfilter.c | 58 xfrm_decode_session(skb, flowi4_to_flowi(&fl4), AF_INET) == 0) { in ip_route_me_harder()
|
D | ip_vti.c | 226 xfrm_decode_session(skb, &fl, AF_INET); in vti_tunnel_xmit() 230 xfrm_decode_session(skb, &fl, AF_INET6); in vti_tunnel_xmit()
|
/linux-4.4.14/include/linux/ |
D | lsm_hooks.h | 1595 int (*xfrm_decode_session)(struct sk_buff *skb, u32 *secid, int ckall); member 1813 struct list_head xfrm_decode_session; member
|
/linux-4.4.14/security/ |
D | security.c | 1475 return call_int_hook(xfrm_decode_session, 0, skb, secid, 1); in security_xfrm_decode_session() 1480 int rc = call_int_hook(xfrm_decode_session, 0, skb, &fl->flowi_secid, in security_skb_classify_flow() 1864 .xfrm_decode_session = 1865 LIST_HEAD_INIT(security_hook_heads.xfrm_decode_session),
|
/linux-4.4.14/net/netfilter/ |
D | nf_nat_core.c | 93 err = xfrm_decode_session(skb, &fl, family); in nf_xfrm_me_harder()
|
/linux-4.4.14/net/xfrm/ |
D | xfrm_policy.c | 1923 xfrm_decode_session(skb, &fl, dst->ops->family); in xfrm_policy_queue_process() 1955 xfrm_decode_session(skb, &fl, skb_dst(skb)->ops->family); in xfrm_policy_queue_process() 2628 if (xfrm_decode_session(skb, &fl, family) < 0) { in __xfrm_route_forward()
|
/linux-4.4.14/include/net/ |
D | xfrm.h | 1111 static inline int xfrm_decode_session(struct sk_buff *skb, struct flowi *fl, in xfrm_decode_session() function
|
/linux-4.4.14/security/selinux/ |
D | hooks.c | 6052 LSM_HOOK_INIT(xfrm_decode_session, selinux_xfrm_decode_session),
|