Home
Sort by
last modified time
|
relevance
|
path
Repository(s)
applications
arkcompiler
base
build
commonlibrary
developtools
device
docs
domains
drivers
foundation
ide
interface
kernel
napi_generator
productdefine
test
third_party
vendor
select all
invert selection
clear
Full Search
Search through all text tokens(words,strings,identifiers,numbers) in index.
Definition
Only finds symbol definitions(where e.g a variable(function,...) is defined).
Symbol
Only finds symbol(e.g. methods classes,function,variables).
File Path
Path of the source file(use "/").If you want just exact path,enclose it in "".Source files end with: .jar/.bz2/.a/.h/.java...
History
History log comments.
Type
Any
Bzip(2)
C
Clojure
C#
C++
ELF
Erlang
Image file
Fortran
Golang
GZIP
Haskell
Jar
Java
Java class
JavaScript
Lisp
Lua
Pascal
Perl
PHP
Plain Text
PL/SQL
Python
Rust
Scala
Shell script
SQL
Tar
Tcl
Troff
UUEncoded
Visual Basic
XML
Zip
Type of analyzer used to filter file types include with selected(e.g. just C sources).
Help
Searched
refs:XFRM_MAX_DEPTH
(Results
1 - 20
of
20
) sorted by relevance
/kernel/linux/linux-5.10/net/netfilter/
H
A
D
nft_xfrm.c
84
if (spnum >=
XFRM_MAX_DEPTH
)
in nft_xfrm_get_init()
/kernel/linux/linux-5.10/net/ipv6/
H
A
D
xfrm6_input.c
192
if (1 + sp->len ==
XFRM_MAX_DEPTH
) {
in xfrm6_input_addr()
H
A
D
esp6_offload.c
73
if (sp->len ==
XFRM_MAX_DEPTH
)
in esp6_gro_receive()
/kernel/linux/linux-6.6/net/ipv6/
H
A
D
xfrm6_input.c
192
if (1 + sp->len ==
XFRM_MAX_DEPTH
) {
in xfrm6_input_addr()
H
A
D
esp6_offload.c
74
if (sp->len ==
XFRM_MAX_DEPTH
)
in esp6_gro_receive()
/kernel/linux/linux-6.6/net/netfilter/
H
A
D
nft_xfrm.c
85
if (spnum >=
XFRM_MAX_DEPTH
)
in nft_xfrm_get_init()
/kernel/linux/linux-5.10/net/xfrm/
H
A
D
xfrm_policy.c
2425
struct xfrm_state *tp[
XFRM_MAX_DEPTH
];
in xfrm_tmpl_resolve()
2433
if (cnx + pols[i]->xfrm_nr >=
XFRM_MAX_DEPTH
) {
in xfrm_tmpl_resolve()
2724
struct xfrm_state *xfrm[
XFRM_MAX_DEPTH
];
in xfrm_resolve_and_create_bundle()
2725
struct xfrm_dst *bundle[
XFRM_MAX_DEPTH
];
in xfrm_resolve_and_create_bundle()
3661
struct xfrm_tmpl *tp[
XFRM_MAX_DEPTH
];
in __xfrm_policy_check()
3662
struct xfrm_tmpl *stp[
XFRM_MAX_DEPTH
];
in __xfrm_policy_check()
3677
if (ti + pols[pi]->xfrm_nr >=
XFRM_MAX_DEPTH
) {
in __xfrm_policy_check()
3845
struct xfrm_dst *bundle[
XFRM_MAX_DEPTH
];
in xfrm_bundle_ok()
4425
if (num_migrate < 1 || num_migrate >
XFRM_MAX_DEPTH
)
in xfrm_migrate_check()
4458
struct xfrm_state *x_cur[
XFRM_MAX_DEPTH
];
in xfrm_migrate()
[all...]
H
A
D
xfrm_user.c
1554
if (nr >
XFRM_MAX_DEPTH
)
in validate_tmpl()
1750
struct xfrm_user_tmpl vec[
XFRM_MAX_DEPTH
];
in copy_to_user_tmpl()
2505
if (num_migrate <= 0 || num_migrate >
XFRM_MAX_DEPTH
)
in copy_from_user_migrate()
2530
struct xfrm_migrate m[
XFRM_MAX_DEPTH
];
in xfrm_do_migrate()
H
A
D
xfrm_input.c
574
if (sp->len ==
XFRM_MAX_DEPTH
) {
in xfrm_input()
H
A
D
xfrm_state.c
1823
int count[
XFRM_MAX_DEPTH
] = { };
in __xfrm6_sort()
1824
int class[
XFRM_MAX_DEPTH
];
in __xfrm6_sort()
/kernel/linux/linux-6.6/net/xfrm/
H
A
D
xfrm_policy.c
2506
struct xfrm_state *tp[
XFRM_MAX_DEPTH
];
in xfrm_tmpl_resolve()
2514
if (cnx + pols[i]->xfrm_nr >=
XFRM_MAX_DEPTH
) {
in xfrm_tmpl_resolve()
2807
struct xfrm_state *xfrm[
XFRM_MAX_DEPTH
];
in xfrm_resolve_and_create_bundle()
2808
struct xfrm_dst *bundle[
XFRM_MAX_DEPTH
];
in xfrm_resolve_and_create_bundle()
3707
struct xfrm_tmpl *tp[
XFRM_MAX_DEPTH
];
in __xfrm_policy_check()
3708
struct xfrm_tmpl *stp[
XFRM_MAX_DEPTH
];
in __xfrm_policy_check()
3723
if (ti + pols[pi]->xfrm_nr >=
XFRM_MAX_DEPTH
) {
in __xfrm_policy_check()
3896
struct xfrm_dst *bundle[
XFRM_MAX_DEPTH
];
in xfrm_bundle_ok()
4476
if (num_migrate < 1 || num_migrate >
XFRM_MAX_DEPTH
) {
in xfrm_migrate_check()
4477
NL_SET_ERR_MSG(extack, "Invalid number of SAs to migrate, must be 0 < num <=
XFRM_MAX_DEPTH
(
in xfrm_migrate_check()
[all...]
H
A
D
xfrm_input.c
561
if (sp->len ==
XFRM_MAX_DEPTH
) {
in xfrm_input()
H
A
D
xfrm_user.c
1787
if (nr >
XFRM_MAX_DEPTH
) {
in validate_tmpl()
1788
NL_SET_ERR_MSG(extack, "Template count must be <=
XFRM_MAX_DEPTH
(" __stringify(
XFRM_MAX_DEPTH
) ")");
in validate_tmpl()
2014
struct xfrm_user_tmpl vec[
XFRM_MAX_DEPTH
];
in copy_to_user_tmpl()
2788
if (num_migrate <= 0 || num_migrate >
XFRM_MAX_DEPTH
) {
in copy_from_user_migrate()
2789
NL_SET_ERR_MSG(extack, "Invalid number of SAs to migrate, must be 0 < num <=
XFRM_MAX_DEPTH
(6)");
in copy_from_user_migrate()
2815
struct xfrm_migrate m[
XFRM_MAX_DEPTH
];
in xfrm_do_migrate()
H
A
D
xfrm_state.c
2009
int count[
XFRM_MAX_DEPTH
] = { };
in __xfrm6_sort()
2010
int class[
XFRM_MAX_DEPTH
];
in __xfrm6_sort()
/kernel/linux/linux-5.10/net/ipv4/
H
A
D
esp4_offload.c
51
if (sp->len ==
XFRM_MAX_DEPTH
)
in esp4_gro_receive()
/kernel/linux/linux-6.6/net/ipv4/
H
A
D
esp4_offload.c
52
if (sp->len ==
XFRM_MAX_DEPTH
)
in esp4_gro_receive()
/kernel/linux/linux-5.10/include/net/
H
A
D
xfrm.h
77
policy entry has list of up to
XFRM_MAX_DEPTH
transformations,
483
#define
XFRM_MAX_DEPTH
6
macro
531
struct xfrm_tmpl xfrm_vec[
XFRM_MAX_DEPTH
];
1039
struct xfrm_state *xvec[
XFRM_MAX_DEPTH
];
/kernel/linux/linux-6.6/include/net/
H
A
D
xfrm.h
77
policy entry has list of up to
XFRM_MAX_DEPTH
transformations,
499
#define
XFRM_MAX_DEPTH
6
macro
547
struct xfrm_tmpl xfrm_vec[
XFRM_MAX_DEPTH
];
1059
struct xfrm_state *xvec[
XFRM_MAX_DEPTH
];
/kernel/linux/linux-5.10/net/key/
H
A
D
af_key.c
1954
if (xp->xfrm_nr >=
XFRM_MAX_DEPTH
)
in parse_ipsecrequest()
2561
struct xfrm_migrate m[
XFRM_MAX_DEPTH
];
in pfkey_migrate()
2619
while (len > 0 && i <
XFRM_MAX_DEPTH
) {
in pfkey_migrate()
3570
if (num_bundles <= 0 || num_bundles >
XFRM_MAX_DEPTH
)
in pfkey_send_migrate()
/kernel/linux/linux-6.6/net/key/
H
A
D
af_key.c
1949
if (xp->xfrm_nr >=
XFRM_MAX_DEPTH
)
in parse_ipsecrequest()
2556
struct xfrm_migrate m[
XFRM_MAX_DEPTH
];
in pfkey_migrate()
2614
while (len > 0 && i <
XFRM_MAX_DEPTH
) {
in pfkey_migrate()
3565
if (num_bundles <= 0 || num_bundles >
XFRM_MAX_DEPTH
)
in pfkey_send_migrate()
Completed in 81 milliseconds