Lines Matching refs:mark
610 mark1 = xfrm.XfrmMark(mark=0xf00, mask=xfrm_base.MARK_MASK_ALL)
611 mark2 = xfrm.XfrmMark(mark=0xf00d, mask=xfrm_base.MARK_MASK_ALL)
636 mark = xfrm.XfrmMark(mark=0xf00, mask=xfrm_base.MARK_MASK_ALL)
646 self.xfrm.UpdatePolicyInfo(policy, tmpl1, mark, None)
651 self.xfrm.AddPolicyInfo(policy, tmpl2, mark, None)
653 self.xfrm.UpdatePolicyInfo(policy, tmpl2, mark, None)
669 mark = xfrm.XfrmMark(mark=0xf00, mask=xfrm_base.MARK_MASK_ALL)
671 self.xfrm.AddPolicyInfo(policy, tmpl, mark)
673 self.xfrm.AddPolicyInfo(policy, tmpl, mark)
683 def _CheckTunnelModeOutputMark(self, version, tunsrc, mark, expected_netid): argument
709 spi = TEST_SPI * mark
713 None, None, None, mark)
761 mark = 1234567
764 xfrm_base._ALGO_HMAC_SHA1, None, None, None, mark)
768 self.assertEqual(mark, attributes["XFRMA_OUTPUT_MARK"])
790 mark = xfrm.ExactMatchMark(0xf00d)
796 None, None, mark, 0, is_update=True)
800 self.assertEqual(mark, attributes["XFRMA_MARK"])
802 spi, IPPROTO_ESP, mark)
824 mark = xfrm.ExactMatchMark(netid)
830 self.xfrm.AddPolicyInfo(policy, tmpl, mark)
855 None, None, mark, 0, is_update=False)
863 None, None, mark, 0, is_update=True)
875 None, None, mark, netid, is_update=True)
889 None, None, mark, reroute_netid, is_update=True)
900 self.xfrm.DeleteSaInfo(remote, TEST_SPI, IPPROTO_ESP, mark)
901 self.xfrm.DeletePolicyInfo(sel, xfrm.XFRM_POLICY_OUT, mark)