/net/nfc/hci/ |
H A D | hcp.c | 35 const u8 *payload, size_t payload_len, 41 const u8 *ptr = payload; 33 nfc_hci_hcp_message_tx(struct nfc_hci_dev *hdev, u8 pipe, u8 type, u8 instruction, const u8 *payload, size_t payload_len, data_exchange_cb_t cb, void *cb_context, unsigned long completion_delay) argument
|
/net/bridge/netfilter/ |
H A D | nft_reject_bridge.c | 101 void *payload; local 135 payload = skb_put(nskb, len); 136 memcpy(payload, skb_network_header(oldskb), len); 208 void *payload; local 214 * packet exceeding the minimum IPv6 MTU" in the ICMP payload. 236 payload = skb_put(nskb, len); 237 memcpy(payload, skb_network_header(oldskb), len);
|
/net/ceph/ |
H A D | auth.c | 183 void *payload, *payload_end; local 196 payload = p; 208 payload_end = payload + payload_len; 239 ret = ac->ops->handle_reply(ac, result, payload, payload_end);
|
/net/ipv6/ |
H A D | ping.c | 73 __be16 port, u32 info, u8 *payload) {} 72 dummy_ipv6_icmp_error(struct sock *sk, struct sk_buff *skb, int err, __be16 port, u32 info, u8 *payload) argument
|
H A D | datagram.c | 221 __be16 port, u32 info, u8 *payload) 248 __skb_pull(skb, payload - skb->data); 220 ipv6_icmp_error(struct sock *sk, struct sk_buff *skb, int err, __be16 port, u32 info, u8 *payload) argument
|
H A D | raw.c | 346 u8 *payload = skb->data; local 348 payload += offset; 349 ipv6_icmp_error(sk, skb, err, 0, ntohl(info), payload);
|
/net/mac80211/ |
H A D | tkip.c | 144 * the packet payload). */ 219 * Encrypt packet payload with TKIP using @key. @pos is a pointer to the 220 * beginning of the buffer containing payload. This payload must include 222 * @payload_len is the length of payload (_not_ including IV/ICV length). 228 u8 *payload, size_t payload_len) 235 payload, payload_len); 238 /* Decrypt packet payload with TKIP using @key. @pos is a pointer to the 239 * beginning of the buffer containing IEEE 802.11 header payload, i.e., 241 * length of payload, includin 225 ieee80211_tkip_encrypt_data(struct crypto_cipher *tfm, struct ieee80211_key *key, struct sk_buff *skb, u8 *payload, size_t payload_len) argument 242 ieee80211_tkip_decrypt_data(struct crypto_cipher *tfm, struct ieee80211_key *key, u8 *payload, size_t payload_len, u8 *ta, u8 *ra, int only_iv, int queue, u32 *out_iv32, u16 *out_iv16) argument [all...] |
H A D | tx.c | 1681 u8 *payload = (u8 *)hdr + hdrlen; local 1683 if (ether_addr_equal(payload, rfc1042_header)) 1684 skb->protocol = cpu_to_be16((payload[6] << 8) | 1685 payload[7]);
|
/net/core/ |
H A D | fib_rules.c | 580 size_t payload = NLMSG_ALIGN(sizeof(struct fib_rule_hdr)) local 593 payload += ops->nlmsg_payload(rule); 595 return payload;
|
/net/dccp/ccids/ |
H A D | ccid3.c | 167 * @len: DCCP packet payload size in bytes 720 const u32 payload = skb->len - dccp_hdr(skb)->dccph_doff * 4; local 723 hc->rx_s = payload; 737 const u32 payload = skb->len - dccp_hdr(skb)->dccph_doff * 4; local 739 * Update moving-average of s and the sum of received payload bytes 741 hc->rx_s = tfrc_ewma(hc->rx_s, payload, 9); 742 hc->rx_bytes_recv += payload;
|
/net/atm/ |
H A D | br2684.c | 88 enum br2684_payload payload; member in struct:br2684_dev 207 ((brdev->payload == p_bridged) ? 209 ((brdev->payload == p_bridged) ? BR2684_PAD_LEN : 0); 223 if (brdev->payload == p_bridged) { 227 } else if (brdev->payload == p_routed) { 246 if (brdev->payload == p_bridged) { 480 if (brdev->payload == p_routed) { 667 enum br2684_payload payload; local 675 payload = p_routed; 677 payload [all...] |
/net/ipv4/ |
H A D | ip_sockglue.c | 337 __be16 port, u32 info, u8 *payload) 357 if (skb_pull(skb, payload - skb->data) != NULL) { 336 ip_icmp_error(struct sock *sk, struct sk_buff *skb, int err, __be16 port, u32 info, u8 *payload) argument
|
H A D | fib_semantics.c | 359 size_t payload = NLMSG_ALIGN(sizeof(struct rtmsg)) local 366 payload += nla_total_size((RTAX_MAX * nla_total_size(4))); 378 payload += nla_total_size(fi->fib_nhs * nhsize); 381 return payload;
|
H A D | raw.c | 262 u8 *payload = skb->data + (iph->ihl << 2); local 265 payload = skb->data; 266 ip_icmp_error(sk, skb, err, 0, info, payload);
|
/net/ipv4/netfilter/ |
H A D | ipt_CLUSTERIP.c | 479 static void arp_print(struct arp_payload *payload) argument 486 hbuffer[k++] = hex_asc_hi(payload->src_hw[j]); 487 hbuffer[k++] = hex_asc_lo(payload->src_hw[j]); 493 &payload->src_ip, hbuffer, &payload->dst_ip); 505 struct arp_payload *payload; local 520 payload = (void *)(arp+1); 524 c = clusterip_config_find_get(net, payload->src_ip, 0); 541 memcpy(payload->src_hw, c->clustermac, arp->ar_hln); 545 arp_print(payload); [all...] |
/net/netlink/ |
H A D | genetlink.c | 461 * @payload: size of the message payload 465 * Allocates a new sk_buff large enough to cover the specified payload 470 struct sk_buff *genlmsg_new_unicast(size_t payload, struct genl_info *info, argument 473 size_t len = nlmsg_total_size(genlmsg_total_size(payload));
|
H A D | af_netlink.c | 2785 size_t payload = sizeof(*errmsg); local 2789 payload += nlmsg_len(nlh); 2791 skb = netlink_alloc_skb(in_skb->sk, nlmsg_total_size(payload), 2808 NLMSG_ERROR, payload, 0);
|
/net/nfc/nci/ |
H A D | core.c | 877 int nci_send_cmd(struct nci_dev *ndev, __u16 opcode, __u8 plen, void *payload) argument 899 memcpy(skb_put(skb, plen), payload, plen); local
|
/net/decnet/ |
H A D | dn_table.c | 273 size_t payload = NLMSG_ALIGN(sizeof(struct rtmsg)) local 279 payload += nla_total_size((RTAX_MAX * nla_total_size(4))); 291 payload += nla_total_size(fi->fib_nhs * nhsize); 294 return payload;
|
/net/phonet/ |
H A D | pep.c | 81 static struct sk_buff *pep_alloc_skb(struct sock *sk, const void *payload, argument 91 skb_copy_to_linear_data(skb, payload, len);
|
/net/wireless/ |
H A D | util.c | 367 u8 *payload; local 453 payload = skb->data + hdrlen; 454 ethertype = (payload[6] << 8) | payload[7]; 456 if (likely((ether_addr_equal(payload, rfc1042_header) && 458 ether_addr_equal(payload, bridge_tunnel_header))) { 603 u8 *payload; local 642 * Allocate and reserve two bytes more for payload 665 payload = frame->data; 666 ethertype = (payload[ [all...] |
/net/batman-adv/ |
H A D | network-coding.c | 1478 u8 *payload; local 1485 payload = skb_network_header(skb); 1486 packet = (struct batadv_unicast_packet *)payload; 1504 packet_id = batadv_skb_crc32(skb, payload + sizeof(*packet)); 1531 u8 *payload; local 1538 payload = skb_network_header(skb); 1539 packet = (struct batadv_unicast_packet *)payload; 1564 packet_id = batadv_skb_crc32(skb, payload + sizeof(*packet));
|
/net/netfilter/ipset/ |
H A D | ip_set_core.c | 1425 size_t payload = min(SIZE_MAX, local 1432 skb2 = nlmsg_new(payload, GFP_KERNEL); 1436 nlh->nlmsg_seq, NLMSG_ERROR, payload, 0);
|
/net/sctp/ |
H A D | sm_make_chunk.c | 712 * parameters. However, do not populate the data payload. 973 __be32 payload; local 982 payload = htonl(tsn); 983 sctp_init_cause(retval, SCTP_ERROR_NO_DATA, sizeof(payload)); 984 sctp_addto_chunk(retval, sizeof(payload), (const void *)&payload); 1008 void *payload = NULL; local 1016 /* Put the msg_iov together into payload. */ 1017 payload = kmalloc(paylen, GFP_KERNEL); 1018 if (!payload) 1067 sctp_make_abort_violation( const struct sctp_association *asoc, const struct sctp_chunk *chunk, const __u8 *payload, const size_t paylen) argument 1164 sctp_make_heartbeat_ack(const struct sctp_association *asoc, const struct sctp_chunk *chunk, const void *payload, const size_t paylen) argument 1241 sctp_make_op_error(const struct sctp_association *asoc, const struct sctp_chunk *chunk, __be16 cause_code, const void *payload, size_t paylen, size_t reserve_tail) argument [all...] |
H A D | sm_statefuns.c | 66 const void *payload, 112 const __u8 *payload, 4333 const __u8 *payload, 4355 abort = sctp_make_abort_violation(asoc, chunk, payload, paylen); 4663 * [,unorder flag] [,no-bundle flag] [,payload protocol-id] ) 4710 * o payload protocol-id - A 32 bit unsigned integer that is to be 4711 * passed to the peer indicating the type of payload protocol data 5943 const void *payload, 5965 /* Add specified error causes, i.e., payload, to the 5968 sctp_addto_chunk(abort, paylen, payload); 4327 sctp_sf_abort_violation( struct net *net, const struct sctp_endpoint *ep, const struct sctp_association *asoc, void *arg, sctp_cmd_seq_t *commands, const __u8 *payload, const size_t paylen) argument 5939 sctp_abort_pkt_new(struct net *net, const struct sctp_endpoint *ep, const struct sctp_association *asoc, struct sctp_chunk *chunk, const void *payload, size_t paylen) argument [all...] |