Lines Matching defs:ttl
983 " [ttl drop | fwd\n"
1293 if ((t0 < n_tokens) && (strcmp(tokens[t0], "ttl") == 0)) {
1296 "table action profile ttl");
1301 p.ttl.drop = 1;
1303 p.ttl.drop = 0;
1316 p.ttl.n_packets_enabled = 0;
1318 p.ttl.n_packets_enabled = 1;
1327 } /* ttl */
3011 * label0 <label> <tc> <ttl>
3012 * [label1 <label> <tc> <ttl>
3013 * [label2 <label> <tc> <ttl>
3014 * [label3 <label> <tc> <ttl>]]]
3018 * ipv4 <sa> <da> <dscp> <ttl>
3023 * [ttl dec | keep]
3350 uint32_t label, tc, ttl;
3369 parser_read_uint32(&ttl, tokens[7]) ||
3370 (ttl > 0x3F))
3375 a->encap.mpls.mpls[0].ttl = ttl;
3392 parser_read_uint32(&ttl, tokens[3]) ||
3393 (ttl > 0x3F))
3398 a->encap.mpls.mpls[1].ttl = ttl;
3415 parser_read_uint32(&ttl, tokens[3]) ||
3416 (ttl > 0x3F))
3421 a->encap.mpls.mpls[2].ttl = ttl;
3438 parser_read_uint32(&ttl, tokens[3]) ||
3439 (ttl > 0x3F))
3444 a->encap.mpls.mpls[3].ttl = ttl;
3507 /* ipv4 <sa> <da> <dscp> <ttl>
3511 uint8_t dscp, ttl;
3518 parser_read_uint8(&ttl, tokens[4]))
3524 a->encap.vxlan.ipv4.ttl = ttl;
3633 strcmp(tokens[0], "ttl"))
3637 a->ttl.decrement = 1;
3639 a->ttl.decrement = 0;
4162 if (n_tokens && (strcmp(tokens[0], "ttl") == 0)) {
4168 "action ttl");
4918 l->ttl);
4947 (uint32_t)a->encap.vxlan.ipv4.ttl);
4979 fprintf(f, "ttl %s ", (a->ttl.decrement) ? "dec" : "keep");
5660 "pipeline <pipeline_name> table <table_id> rule read ttl [clear]\n"
5702 if (strcmp(tokens[6], "ttl") != 0) {
5703 snprintf(out, out_size, MSG_ARG_NOT_FOUND, "ttl");
5971 "\tpipeline table rule ttl read\n"
6221 (strcmp(tokens[3], "ttl") == 0) &&
6543 (strcmp(tokens[6], "ttl") == 0)) {