Searched defs:length (Results 1 - 25 of 45) sorted by relevance

12

/net/ceph/
H A Dceph_hash.c23 unsigned int ceph_str_hash_rjenkins(const char *str, unsigned int length) argument
30 len = length;
49 c = c + length;
57 /* the first byte of c is reserved for the length */
84 unsigned int ceph_str_hash_linux(const char *str, unsigned int length) argument
89 while (length--) {
/net/sunrpc/auth_gss/
H A Dgss_generic_token.c59 (constructed, definite-length)
60 <length> possible multiple bytes, need to parse/generate
69 the sequence tag and length octets, the mech OID DER encoding, and the
76 der_length_size( int length) argument
78 if (length < (1<<7))
80 else if (length < (1<<8))
86 else if (length < (1<<16))
88 else if (length < (1<<24))
96 der_write_length(unsigned char **buf, int length) argument
98 if (length < (
[all...]
H A Dgss_krb5_wrap.c43 gss_krb5_padding(int blocksize, int length) argument
45 return blocksize - (length % blocksize);
97 * However adjusting the head length, as we do above, is harmless.
99 * also uses length and head length together to determine the original
101 * easier on the server if we adjust head and tail length in tandem.
H A Dgss_rpc_xdr.c78 u32 length; local
85 length = be32_to_cpup(p);
86 p = xdr_inline_decode(xdr, length);
94 if (length > buf->len)
98 buf->data = kmemdup(p, length, GFP_KERNEL);
102 memcpy(buf->data, p, length);
104 buf->len = length;
183 u32 length; local
193 length = be32_to_cpup(p);
198 p = xdr_inline_decode(xdr, length);
280 u32 length; local
[all...]
H A Dgss_krb5_crypto.c58 int length)
65 if (length % crypto_blkcipher_blocksize(tfm) != 0)
77 memcpy(out, in, length);
78 sg_init_one(sg, out, length);
80 ret = crypto_blkcipher_encrypt_iv(&desc, sg, sg, length);
92 int length)
99 if (length % crypto_blkcipher_blocksize(tfm) != 0)
110 memcpy(out, in, length);
111 sg_init_one(sg, out, length);
113 ret = crypto_blkcipher_decrypt_iv(&desc, sg, sg, length);
53 krb5_encrypt( struct crypto_blkcipher *tfm, void * iv, void * in, void * out, int length) argument
87 krb5_decrypt( struct crypto_blkcipher *tfm, void * iv, void * in, void * out, int length) argument
[all...]
/net/bridge/
H A Dbr_stp_bpdu.c34 const unsigned char *data, int length)
38 skb = dev_alloc_skb(length+LLC_RESERVE);
47 memcpy(__skb_put(skb, length), data, length); local
33 br_send_bpdu(struct net_bridge_port *p, const unsigned char *data, int length) argument
/net/openvswitch/
H A Dvport-netdev.c155 unsigned int length = skb->len - ETH_HLEN; local
158 length -= VLAN_HLEN;
160 return length;
/net/atm/
H A Dlec_arpc.h47 * the length of the tlvs array
59 u8 length; member in struct:tlv
H A Dproc.c381 int length; local
390 length = -EINVAL;
392 length = dev->ops->proc_read(dev, pos, (char *)page);
393 if (length > count)
394 length = -EINVAL;
396 if (length >= 0) {
397 if (copy_to_user(buf, (char *)page, length))
398 length = -EFAULT;
402 return length;
H A Dmpc.c378 uint8_t length, mpoa_device_type, number_of_mps_macs; local
384 dprintk("total length of all TLVs %d\n", sizeoftlvs);
394 length = tlvs[4];
396 dprintk(" type 0x%x length %02x\n", type, length);
397 if (tlvs + length > end_of_tlvs) {
409 tlvs += length;
417 length < (42 + number_of_mps_macs*ETH_ALEN)) { /* :) */
423 length < 22 + number_of_mps_macs*ETH_ALEN) {
1345 tlv[4] = 1 + 1 + ATM_ESA_LEN; /* length */
[all...]
/net/ipv4/
H A Dtcp_probe.c59 u16 length; member in struct:tcp_log
114 p->length = skb->len;
165 p->length, p->snd_nxt, p->snd_una,
H A Dip_output.c753 void *from, int length, int hh_len, int fragheaderlen,
786 /* specify the length of each IP datagram fragment */
793 (length - transhdrlen));
803 void *from, int length, int transhdrlen,
830 if (cork->length + length > 0xFFFF - fragheaderlen) {
841 length + fragheaderlen <= mtu &&
846 cork->length += length;
847 if (((length > mt
749 ip_ufo_append_data(struct sock *sk, struct sk_buff_head *queue, int getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb), void *from, int length, int hh_len, int fragheaderlen, int transhdrlen, int maxfraglen, unsigned int flags) argument
796 __ip_append_data(struct sock *sk, struct flowi4 *fl4, struct sk_buff_head *queue, struct inet_cork *cork, struct page_frag *pfrag, int getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb), void *from, int length, int transhdrlen, unsigned int flags) argument
1087 ip_append_data(struct sock *sk, struct flowi4 *fl4, int getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb), void *from, int length, int transhdrlen, struct ipcm_cookie *ipc, struct rtable **rtp, unsigned int flags) argument
1407 ip_make_skb(struct sock *sk, struct flowi4 *fl4, int getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb), void *from, int length, int transhdrlen, struct ipcm_cookie *ipc, struct rtable **rtp, unsigned int flags) argument
[all...]
/net/irda/irnet/
H A Dirnet_ppp.c52 int length; /* Length of current command */ local
87 length = next - start; /* Length */
91 length = strlen(start);
93 DEBUG(CTRL_INFO, "Found command ``%s'' (%d).\n", start, length);
102 if((length > 5) && (strcmp(start + 5, "any")))
105 while(isspace(start[length - 1]))
106 length--;
108 DABORT(length < 5 || length > NICKNAME_MAX_LEN + 5,
112 memcpy(ap->rname, start + 5, length
[all...]
/net/l2tp/
H A Dl2tp_eth.c147 unsigned int length; local
149 length = min(32u, skb->len);
150 if (!pskb_may_pull(skb, length))
154 print_hex_dump_bytes("", DUMP_PREFIX_OFFSET, skb->data, length);
H A Dl2tp_ip.c124 int length; local
155 length = min(32u, skb->len);
156 if (!pskb_may_pull(skb, length))
160 print_hex_dump_bytes("", DUMP_PREFIX_OFFSET, ptr, length);
H A Dl2tp_ip6.c136 int length; local
167 length = min(32u, skb->len);
168 if (!pskb_may_pull(skb, length))
172 print_hex_dump_bytes("", DUMP_PREFIX_OFFSET, ptr, length);
/net/mac80211/
H A Drc80211_pid_debugfs.c134 size_t length, loff_t *offset)
168 length = length < RC_PID_PRINT_BUF_SIZE ?
169 length : RC_PID_PRINT_BUF_SIZE;
170 p = snprintf(pb, length, "%u %lu ", ev->id, ev->timestamp);
173 p += snprintf(pb + p, length - p, "tx_status %u %u",
178 p += snprintf(pb + p, length - p, "rate_change %d %d",
182 p += snprintf(pb + p, length - p, "tx_rate %d %d",
186 p += snprintf(pb + p, length - p,
192 p += snprintf(pb + p, length
133 rate_control_pid_events_read(struct file *file, char __user *buf, size_t length, loff_t *offset) argument
[all...]
/net/batman-adv/
H A Dsysfs.c531 ssize_t length; local
543 length = sprintf(buff, "%s\n", ifname);
547 return length;
612 ssize_t length; local
620 length = sprintf(buff, "disabling\n");
623 length = sprintf(buff, "inactive\n");
626 length = sprintf(buff, "active\n");
629 length = sprintf(buff, "enabling\n");
633 length = sprintf(buff, "not in use\n");
639 return length;
[all...]
/net/netfilter/
H A Dnf_conntrack_ftp.c149 /* Returns 0, or length of numbers: 192,168,1,1,5,6 */
153 int length; local
156 length = try_number(data, dlen, array, 6, ',', term);
157 if (length == 0)
163 return length;
192 /* Returns 0, or length of numbers: |1|132.235.1.2|6275| or |2|3ffe::1|6275| */
197 int length; local
223 length = try_number(data + 3, dlen - 3, array, 4, '.', delim);
224 if (length != 0)
229 length
[all...]
/net/nfc/
H A Dllcp_commands.c95 u8 *tlv, length; local
102 length = llcp_tlv_length[type];
103 if (length == 0 && value_length == 0)
105 else if (length == 0)
106 length = value_length;
108 *tlv_length = 2 + length;
109 tlv = kzalloc(2 + length, GFP_KERNEL);
114 tlv[1] = length;
115 memcpy(tlv + 2, value, length);
205 u8 *tlv = tlv_array, type, length, offse local
254 u8 *tlv = tlv_array, type, length, offset = 0; local
[all...]
/net/rds/
H A Diw_send.c153 sge->length = sizeof(struct rds_header);
450 unsigned long buffer, unsigned int length,
464 if (length != 0) {
467 sge->length = length;
479 sge->length = sizeof(struct rds_header);
777 send->s_wr.wr.fast_reg.length = len;
904 send->s_sge[j].length = len;
918 send->s_sge[0].length = conn->c_xmit_rm->m_rs->rs_user_bytes;
448 rds_iw_xmit_populate_wr(struct rds_iw_connection *ic, struct rds_iw_send_work *send, unsigned int pos, unsigned long buffer, unsigned int length, int send_flags) argument
/net/sched/
H A Dsch_teql.c317 unsigned int length = qdisc_pkt_len(skb); local
326 master->tx_bytes += length;
/net/core/
H A Dflow.c180 const u32 length = keysize * sizeof(flow_compare_t) / sizeof(u32); local
182 return jhash2(k, length, fcp->hash_rnd)
/net/sunrpc/xprtrdma/
H A Dsvc_rdma_transport.c116 for (i = 0; i < ctxt->count && ctxt->sge[i].length; i++) {
127 ctxt->sge[i].length,
511 ctxt->sge[sge_no].length = PAGE_SIZE;
1239 fastreg_wr.wr.fast_reg.length = frmr->map_len;
1310 int length; local
1317 length = svc_rdma_xdr_encode_error(xprt, rmsgp, err, va);
1326 p, 0, length, DMA_FROM_DEVICE);
1334 ctxt->sge[0].length = length;
/net/ax25/
H A Daf_ax25.c686 int maxlen, length; local
698 length = min_t(unsigned int, maxlen, sizeof(int));
753 length = strlen(devname) + 1;
756 length = 1;
768 if (put_user(length, optlen))
771 return copy_to_user(optval, valptr, length) ? -EFAULT : 0;

Completed in 253 milliseconds

12