/external/syslinux/gpxe/src/net/infiniband/ |
H A D | ib_packet.c | 43 * @v payload_len Payload length 47 struct ib_queue_pair *qp, size_t payload_len, 64 pad_len = ( (-payload_len) & 0x3 ); 65 payload_len += pad_len; 66 payload_len += 4; /* ICRC */ 72 grh_len = ( payload_len + iob_len ( iobuf ) - orig_iob_len ); 76 lrh_len = ( payload_len + iob_len ( iobuf ) - orig_iob_len ); 121 * @v payload_len Payload length to fill in, or NULL 125 struct ib_queue_pair **qp, size_t *payload_len, 140 if ( payload_len ) 46 ib_push( struct ib_device *ibdev, struct io_buffer *iobuf, struct ib_queue_pair *qp, size_t payload_len, const struct ib_address_vector *av ) argument 124 ib_pull( struct ib_device *ibdev, struct io_buffer *iobuf, struct ib_queue_pair **qp, size_t *payload_len, struct ib_address_vector *av ) argument [all...] |
/external/android-clat/ |
H A D | netlink_msg.c | 53 * payload_len - bytelength of structure 55 struct nl_msg *nlmsg_alloc_generic(uint16_t type, uint16_t flags, void *payload_struct, size_t payload_len) { argument 63 if ((sizeof(struct nl_msg) + payload_len) > msg->nm_size) { 68 msg->nm_nlh->nlmsg_len = NLMSG_LENGTH(payload_len); 72 memcpy(nlmsg_data(msg->nm_nlh), payload_struct, payload_len);
|
/external/linux-kselftest/tools/testing/selftests/bpf/ |
H A D | test_xdp.c | 89 __u16 payload_len; local 106 payload_len = bpf_ntohs(iph->tot_len); 136 iph->tot_len = bpf_htons(payload_len + sizeof(*iph)); 161 __u16 payload_len; local 176 payload_len = ip6h->payload_len; 202 ip6h->payload_len = bpf_htons(bpf_ntohs(payload_len) + sizeof(*ip6h));
|
/external/syslinux/gpxe/src/core/ |
H A D | gdbudp.c | 64 size_t payload_len; local 135 payload_len = ntohs ( udphdr->len ); 136 if ( payload_len < sizeof ( *udphdr ) || payload_len > iob_len ( iob ) ) { 139 payload_len -= sizeof ( *udphdr ); 141 if ( payload_len > len ) { 144 memcpy ( buf, iob->data, payload_len ); 147 return payload_len;
|
/external/syslinux/gpxe/src/include/gpxe/ |
H A D | ip6.h | 40 uint16_t payload_len; member in struct:ip6_header
|
/external/webrtc/webrtc/modules/audio_coding/codecs/ |
H A D | audio_decoder.cc | 61 size_t payload_len, 60 IncomingPacket(const uint8_t* payload, size_t payload_len, uint16_t rtp_sequence_number, uint32_t rtp_timestamp, uint32_t arrival_timestamp) argument
|
/external/webrtc/webrtc/modules/audio_coding/codecs/isac/ |
H A D | audio_decoder_isac_t_impl.h | 77 size_t payload_len, 81 int ret = T::UpdateBwEstimate(isac_state_, payload, payload_len, 76 IncomingPacket(const uint8_t* payload, size_t payload_len, uint16_t rtp_sequence_number, uint32_t rtp_timestamp, uint32_t arrival_timestamp) argument
|
/external/webrtc/webrtc/modules/audio_coding/neteq/ |
H A D | audio_decoder_impl.cc | 53 size_t payload_len, 52 IncomingPacket(const uint8_t* payload, size_t payload_len, uint16_t rtp_sequence_number, uint32_t rtp_timestamp, uint32_t arrival_timestamp) argument
|
H A D | packet_buffer_unittest.cc | 92 const int payload_len = 100; local 93 Packet* packet = gen.NextPacket(payload_len); 112 const int payload_len = 10; local 116 Packet* packet = gen.NextPacket(payload_len); 134 const int payload_len = 10; local 137 Packet* packet = gen.NextPacket(payload_len); 146 Packet* packet = gen.NextPacket(payload_len); 162 const int payload_len = 10; local 166 Packet* packet = gen.NextPacket(payload_len); 198 const int payload_len local 298 const int payload_len = 10; local 326 const int payload_len = 10; local 374 int payload_len = 100; local 502 const int payload_len = 10; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_common.c | 116 * @payload_len: Payload length in bytes (data after Type) 126 * payload_len bytes and has the EAP header and Type field already filled in. 128 struct wpabuf * eap_msg_alloc(int vendor, EapType type, size_t payload_len, argument 136 payload_len;
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_common.c | 116 * @payload_len: Payload length in bytes (data after Type) 126 * payload_len bytes and has the EAP header and Type field already filled in. 128 struct wpabuf * eap_msg_alloc(int vendor, EapType type, size_t payload_len, argument 136 payload_len;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_common.c | 116 * @payload_len: Payload length in bytes (data after Type) 126 * payload_len bytes and has the EAP header and Type field already filled in. 128 struct wpabuf * eap_msg_alloc(int vendor, EapType type, size_t payload_len, argument 136 payload_len;
|
/external/libnl/lib/netfilter/ |
H A D | queue_msg.c | 258 * @arg payload_len payload length 263 const void *payload_data, unsigned payload_len) 280 nla.nla_len = payload_len + sizeof(nla); 287 iov[2].iov_len = NLA_ALIGN(payload_len); 261 nfnl_queue_msg_send_verdict_payload(struct nl_sock *nlh, const struct nfnl_queue_msg *msg, const void *payload_data, unsigned payload_len) argument
|
/external/tcpdump/ |
H A D | print-ip6.c | 221 register u_int payload_len; local 242 payload_len = EXTRACT_16BITS(&ip6->ip6_plen); 243 len = payload_len + sizeof(struct ip6_hdr); 269 payload_len));
|
/external/webrtc/webrtc/modules/audio_coding/neteq/tools/ |
H A D | neteq_performance_test.cc | 70 size_t payload_len = WebRtcPcm16b_Encode(input_samples.data(), local 72 RTC_CHECK_EQ(sizeof(input_payload), payload_len); local 100 payload_len = WebRtcPcm16b_Encode(input_samples.data(), 102 assert(payload_len == kInputBlockSizeSamples * sizeof(int16_t));
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_record.c | 143 * @payload_len: Length of the payload 151 size_t buf_size, const u8 *payload, size_t payload_len, 171 WPA_PUT_BE16(length, payload_len); 196 if (pos + payload_len > buf + buf_size) 198 os_memmove(pos, payload, payload_len); 199 pos += payload_len; 217 crypto_hash_update(hmac, payload, payload_len); 150 tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, size_t buf_size, const u8 *payload, size_t payload_len, size_t *out_len) argument
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_record.c | 143 * @payload_len: Length of the payload 151 size_t buf_size, const u8 *payload, size_t payload_len, 171 WPA_PUT_BE16(length, payload_len); 196 if (pos + payload_len > buf + buf_size) 198 os_memmove(pos, payload, payload_len); 199 pos += payload_len; 217 crypto_hash_update(hmac, payload, payload_len); 150 tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, size_t buf_size, const u8 *payload, size_t payload_len, size_t *out_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_record.c | 143 * @payload_len: Length of the payload 151 size_t buf_size, const u8 *payload, size_t payload_len, 171 WPA_PUT_BE16(length, payload_len); 196 if (pos + payload_len > buf + buf_size) 198 os_memmove(pos, payload, payload_len); 199 pos += payload_len; 217 crypto_hash_update(hmac, payload, payload_len); 150 tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, size_t buf_size, const u8 *payload, size_t payload_len, size_t *out_len) argument
|
/external/libchrome/base/posix/ |
H A D | unix_domain_socket_linux.cc | 138 const unsigned payload_len = cmsg->cmsg_len - CMSG_LEN(0); local 141 DCHECK_EQ(payload_len % sizeof(int), 0u); 144 wire_fds_len = payload_len / sizeof(int); 151 DCHECK_EQ(payload_len, sizeof(struct ucred));
|
/external/libnetfilter_conntrack/src/conntrack/ |
H A D | parse_mnl.c | 859 nfct_payload_parse(const void *payload, size_t payload_len, argument 864 if (mnl_attr_parse_payload(payload, payload_len,
|
/external/libnl/include/linux-private/linux/ |
H A D | ipv6.h | 102 __be16 payload_len; member in struct:ipv6hdr
|
/external/syslinux/core/lwip/src/core/snmp/ |
H A D | msg_in.c | 814 u16_t payload_len = p->tot_len; local 846 err_ret = snmp_pdu_header_check(p, payload_ofs, payload_len, &varbind_ofs, msg_ps);
|
/external/webrtc/webrtc/base/ |
H A D | ifaddrs-android.cc | 175 ssize_t payload_len = IFA_PAYLOAD(header); local 176 while (RTA_OK(rta, payload_len)) { 196 rta = RTA_NEXT(rta, payload_len);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_sake.c | 145 size_t payload_len) 157 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 188 size_t payload_len) 206 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 287 size_t payload_len) 301 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 140 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, u8 id, const u8 *payload, size_t payload_len) argument 183 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, u8 id, const u8 *payload, size_t payload_len) argument 281 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, u8 id, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_tls_common.c | 21 struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, argument 26 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len, 30 EAP_VENDOR_WFA_UNAUTH_TLS, payload_len, 32 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code,
|