Lines Matching refs:match
30 "policy match options:\n"
31 " --dir in|out match policy applied during decapsulation/\n"
33 " --pol none|ipsec match policy\n"
34 " --strict match entire policy instead of single element\n"
37 "[!] --reqid reqid match reqid\n"
38 "[!] --spi spi match SPI\n"
39 "[!] --proto proto match protocol (ah/esp/ipcomp)\n"
40 "[!] --mode mode match mode (transport/tunnel)\n"
41 "[!] --tunnel-src addr/mask match tunnel source\n"
42 "[!] --tunnel-dst addr/mask match tunnel destination\n"
82 xtables_error(PARAMETER_PROBLEM, "policy match: invalid policy \"%s\"", s);
91 xtables_error(PARAMETER_PROBLEM, "policy match: invalid mode \"%s\"", s);
111 if (e->match.reqid)
113 "policy match: double --reqid option");
114 e->match.reqid = 1;
119 if (e->match.spi)
121 "policy match: double --spi option");
122 e->match.spi = 1;
127 if (e->match.saddr)
129 "policy match: double --tunnel-src option");
131 e->match.saddr = 1;
137 if (e->match.daddr)
139 "policy match: double --tunnel-dst option");
140 e->match.daddr = 1;
146 if (e->match.proto)
148 "policy match: double --proto option");
153 "policy match: protocol must be ah/esp/ipcomp");
154 e->match.proto = 1;
158 if (e->match.mode)
160 "policy match: double --mode option");
161 e->match.mode = 1;
168 "policy match: maximum policy depth reached");
185 "policy match: neither --dir in nor --dir out specified");
190 "policy match: policy none but --strict given");
194 "policy match: policy none but policy given");
204 "policy match: multiple elements but no --strict");
211 !(e->match.reqid || e->match.spi || e->match.saddr ||
212 e->match.daddr || e->match.proto || e->match.mode))
214 "policy match: empty policy element %u. "
219 if ((e->match.saddr || e->match.daddr)
223 "policy match: --tunnel-src/--tunnel-dst "
267 if (e->match.reqid) {
271 if (e->match.spi) {
275 if (e->match.proto) {
279 if (e->match.mode) {
283 if (e->match.daddr) {
294 if (e->match.saddr) {
323 static void policy4_print(const void *ip, const struct xt_entry_match *match,
326 const struct xt_policy_info *info = (void *)match->data;
329 printf(" policy match");
338 static void policy6_print(const void *ip, const struct xt_entry_match *match,
341 const struct xt_policy_info *info = (void *)match->data;
344 printf(" policy match");
353 static void policy4_save(const void *ip, const struct xt_entry_match *match)
355 const struct xt_policy_info *info = (void *)match->data;
366 static void policy6_save(const void *ip, const struct xt_entry_match *match)
368 const struct xt_policy_info *info = (void *)match->data;