Lines Matching defs:cipso

6  * draft-ietf-cipso-ipsecurity-01.txt with additional tag types as found in
13 * https://tools.ietf.org/id/draft-ietf-cipso-ipsecurity-01.txt
471 kfree(doi_def->map.std->lvl.cipso);
473 kfree(doi_def->map.std->cat.cipso);
649 (doi_def->map.std->lvl.cipso[level] < CIPSO_V4_INV_LVL))
714 map_tbl->lvl.cipso[net_lvl] < CIPSO_V4_INV_LVL) {
715 *host_lvl = doi_def->map.std->lvl.cipso[net_lvl];
750 cipso_array = doi_def->map.std->cat.cipso;
859 net_cat_array = doi_def->map.std->cat.cipso;
1876 opt->opt.cipso = sizeof(struct iphdr);
1953 opt->opt.cipso = sizeof(struct iphdr);
1985 if (!opt || opt->opt.cipso == 0)
1994 cipso_off = opt->opt.cipso - sizeof(struct iphdr);
1998 if (opt->opt.srr > opt->opt.cipso)
2000 if (opt->opt.rr > opt->opt.cipso)
2002 if (opt->opt.ts > opt->opt.cipso)
2004 if (opt->opt.router_alert > opt->opt.cipso)
2006 opt->opt.cipso = 0;
2028 /* only the cipso option was present on the socket so we can
2076 * @cipso: the CIPSO v4 option
2080 * Inspect @cipso and return the security attributes in @secattr. Returns zero
2084 int cipso_v4_getattr(const unsigned char *cipso,
2091 if (cipso_v4_cache_check(cipso, cipso[1], secattr) == 0)
2094 doi = get_unaligned_be32(&cipso[2]);
2102 switch (cipso[6]) {
2104 ret_val = cipso_v4_parsetag_rbm(doi_def, &cipso[6], secattr);
2107 ret_val = cipso_v4_parsetag_enum(doi_def, &cipso[6], secattr);
2110 ret_val = cipso_v4_parsetag_rng(doi_def, &cipso[6], secattr);
2113 ret_val = cipso_v4_parsetag_loc(doi_def, &cipso[6], secattr);
2143 if (opt && opt->opt.cipso)
2145 opt->opt.cipso -
2212 opt->cipso = sizeof(struct iphdr);
2248 if (opt->cipso == 0)
2256 /* the easiest thing to do is just replace the cipso option with noop
2261 cipso_ptr = (unsigned char *)iph + opt->cipso;
2263 opt->cipso = 0;