Lines Matching defs:cipso
6 * draft-ietf-cipso-ipsecurity-01.txt with additional tag types as found in
13 * https://tools.ietf.org/id/draft-ietf-cipso-ipsecurity-01.txt
472 kfree(doi_def->map.std->lvl.cipso);
474 kfree(doi_def->map.std->cat.cipso);
650 (doi_def->map.std->lvl.cipso[level] < CIPSO_V4_INV_LVL))
715 map_tbl->lvl.cipso[net_lvl] < CIPSO_V4_INV_LVL) {
716 *host_lvl = doi_def->map.std->lvl.cipso[net_lvl];
751 cipso_array = doi_def->map.std->cat.cipso;
860 net_cat_array = doi_def->map.std->cat.cipso;
1877 opt->opt.cipso = sizeof(struct iphdr);
1954 opt->opt.cipso = sizeof(struct iphdr);
1986 if (!opt || opt->opt.cipso == 0)
1995 cipso_off = opt->opt.cipso - sizeof(struct iphdr);
1999 if (opt->opt.srr > opt->opt.cipso)
2001 if (opt->opt.rr > opt->opt.cipso)
2003 if (opt->opt.ts > opt->opt.cipso)
2005 if (opt->opt.router_alert > opt->opt.cipso)
2007 opt->opt.cipso = 0;
2029 /* only the cipso option was present on the socket so we can
2077 * @cipso: the CIPSO v4 option
2081 * Inspect @cipso and return the security attributes in @secattr. Returns zero
2085 int cipso_v4_getattr(const unsigned char *cipso,
2092 if (cipso_v4_cache_check(cipso, cipso[1], secattr) == 0)
2095 doi = get_unaligned_be32(&cipso[2]);
2103 switch (cipso[6]) {
2105 ret_val = cipso_v4_parsetag_rbm(doi_def, &cipso[6], secattr);
2108 ret_val = cipso_v4_parsetag_enum(doi_def, &cipso[6], secattr);
2111 ret_val = cipso_v4_parsetag_rng(doi_def, &cipso[6], secattr);
2114 ret_val = cipso_v4_parsetag_loc(doi_def, &cipso[6], secattr);
2144 if (opt && opt->opt.cipso)
2146 opt->opt.cipso -
2213 opt->cipso = sizeof(struct iphdr);
2249 if (opt->cipso == 0)
2257 /* the easiest thing to do is just replace the cipso option with noop
2262 cipso_ptr = (unsigned char *)iph + opt->cipso;
2264 opt->cipso = 0;