Home | History | Annotate | Download | only in extensions

Lines Matching full:match

26 "policy match options:\n"
27 " --dir in|out match policy applied during decapsulation/\n"
29 " --pol none|ipsec match policy\n"
30 " --strict match entire policy instead of single element\n"
33 "[!] --reqid reqid match reqid\n"
34 "[!] --spi spi match SPI\n"
35 "[!] --proto proto match protocol (ah/esp/ipcomp)\n"
36 "[!] --mode mode match mode (transport/tunnel)\n"
37 "[!] --tunnel-src addr/mask match tunnel source\n"
38 "[!] --tunnel-dst addr/mask match tunnel destination\n"
79 xtables_error(PARAMETER_PROBLEM, "policy match: invalid policy \"%s\"", s);
88 xtables_error(PARAMETER_PROBLEM, "policy match: invalid mode \"%s\"", s);
108 if (e->match.reqid)
110 "policy match: double --reqid option");
111 e->match.reqid = 1;
116 if (e->match.spi)
118 "policy match: double --spi option");
119 e->match.spi = 1;
124 if (e->match.saddr)
126 "policy match: double --tunnel-src option");
128 e->match.saddr = 1;
134 if (e->match.daddr)
136 "policy match: double --tunnel-dst option");
137 e->match.daddr = 1;
143 if (e->match.proto)
145 "policy match: double --proto option");
150 "policy match: protocol must be ah/esp/ipcomp");
151 e->match.proto = 1;
155 if (e->match.mode)
157 "policy match: double --mode option");
158 e->match.mode = 1;
165 "policy match: maximum policy depth reached");
182 "policy match: neither --dir in nor --dir out specified");
187 "policy match: policy none but --strict given");
191 "policy match: policy none but policy given");
201 "policy match: multiple elements but no --strict");
208 !(e->match.reqid || e->match.spi || e->match.saddr ||
209 e->match.daddr || e->match.proto || e->match.mode))
211 "policy match: empty policy element %u. "
216 if ((e->match.saddr || e->match.daddr)
220 "policy match: --tunnel-src/--tunnel-dst "
264 if (e->match.reqid) {
268 if (e->match.spi) {
272 if (e->match.proto) {
276 if (e->match.mode) {
280 if (e->match.daddr) {
291 if (e->match.saddr) {
320 static void policy4_print(const void *ip, const struct xt_entry_match *match,
323 const struct xt_policy_info *info = (void *)match->data;
326 printf(" policy match");
335 static void policy6_print(const void *ip, const struct xt_entry_match *match,
338 const struct xt_policy_info *info = (void *)match->data;
341 printf(" policy match");
350 static void policy4_save(const void *ip, const struct xt_entry_match *match)
352 const struct xt_policy_info *info = (void *)match->data;
363 static void policy6_save(const void *ip, const struct xt_entry_match *match)
365 const struct xt_policy_info *info = (void *)match->data;