Lines Matching refs:match
28 " --dir in|out match policy applied during decapsulation/\n"
30 " --pol none|ipsec match policy\n"
31 " --strict match entire policy instead of single element\n"
33 "[!] --reqid reqid match reqid\n"
34 "[!] --spi spi match SPI\n"
35 "[!] --proto proto match protocol (ah/esp/ipcomp)\n"
36 "[!] --mode mode match mode (transport/tunnel)\n"
37 "[!] --tunnel-src addr/mask match tunnel source\n"
38 "[!] --tunnel-dst addr/mask match tunnel destination\n"
116 exit_error(PARAMETER_PROBLEM, "policy match: invalid policy `%s'", s);
125 exit_error(PARAMETER_PROBLEM, "policy match: invalid mode `%s'", s);
131 struct ipt_entry_match **match)
133 struct ipt_policy_info *info = (void *)(*match)->data;
145 "policy match: double --dir option");
148 "policy match: can't invert --dir option");
155 "policy match: can't invert --policy option");
162 "policy match: double --strict option");
166 "policy match: can't invert --strict option");
171 if (e->match.reqid)
173 "policy match: double --reqid option");
175 e->match.reqid = 1;
180 if (e->match.spi)
182 "policy match: double --spi option");
184 e->match.spi = 1;
189 if (e->match.saddr)
191 "policy match: double --tunnel-src option");
196 "policy match: name resolves to multiple IPs");
198 e->match.saddr = 1;
204 if (e->match.daddr)
206 "policy match: double --tunnel-dst option");
211 "policy match: name resolves to multiple IPs");
213 e->match.daddr = 1;
219 if (e->match.proto)
221 "policy match: double --proto option");
227 "policy match: protocol must ah/esp/ipcomp");
228 e->match.proto = 1;
232 if (e->match.mode)
234 "policy match: double --mode option");
237 e->match.mode = 1;
244 "policy match: can't invert --next option");
248 "policy match: maximum policy depth reached");
266 "policy match: no parameters given");
270 "policy match: neither --in nor --out specified");
275 "policy match: policy none but --strict given");
279 "policy match: policy none but policy given");
285 "policy match: multiple elements but no --strict");
291 !(e->match.reqid || e->match.spi || e->match.saddr ||
292 e->match.daddr || e->match.proto || e->match.mode))
294 "policy match: empty policy element");
296 if ((e->match.saddr || e->match.daddr)
300 "policy match: --tunnel-src/--tunnel-dst "
344 if (e->match.reqid) {
348 if (e->match.spi) {
352 if (e->match.proto) {
356 if (e->match.mode) {
360 if (e->match.daddr) {
366 if (e->match.saddr) {
391 const struct ipt_entry_match *match,
394 const struct ipt_policy_info *info = (void *)match->data;
397 printf("policy match ");
406 static void save(const struct ipt_ip *ip, const struct ipt_entry_match *match)
408 const struct ipt_policy_info *info = (void *)match->data;