Searched refs:length (Results 51 - 75 of 106) sorted by relevance

12345

/net/l2tp/
H A Dl2tp_ip6.c136 int length; local
167 length = min(32u, skb->len);
168 if (!pskb_may_pull(skb, length))
172 print_hex_dump_bytes("", DUMP_PREFIX_OFFSET, ptr, length);
H A Dl2tp_core.h72 u16 l2specific_len; /* Layer 2 specific length */
265 int length, int (*payload_hook)(struct sk_buff *skb));
/net/sctp/
H A Dulpevent.c156 /* Trim the buffer to the right length. */
158 ntohs(chunk->chunk_hdr->length) -
200 * This field is the total length of the notification data, including
287 * This field is the total length of the notification data, including
383 elen = WORD_ROUND(ntohs(ch->length)) - sizeof(sctp_errhdr_t);
404 /* Trim the buffer to the right length. */
435 int len = ntohs(chunk->chunk_hdr->length);
483 * This field is the total length of the notification data, including
572 * This field is the total length of the notification data, including
676 * pass up the wrong length t
[all...]
H A Dsm_statefuns.c160 /* Small helper function that checks if the chunk length
161 * is of the appropriate length. The 'required_length' argument
163 * Return Values: 1 = Valid length
164 * 0 = Invalid length
171 __u16 chunk_length = ntohs(chunk->chunk_hdr->length);
238 /* Make sure that the SHUTDOWN_COMPLETE chunk has a valid length. */
344 /* Make sure that the INIT chunk has a valid length.
373 ntohs(err_chunk->chunk_hdr->length) -
395 /* Tag the variable length parameters. */
420 len = ntohs(err_chunk->chunk_hdr->length)
[all...]
H A Dinput.c669 /* Break out if chunk length is less then minimal. */
670 if (ntohs(ch->length) < sizeof(sctp_chunkhdr_t))
673 ch_end = ((__u8 *)ch) + WORD_ROUND(ntohs(ch->length));
1047 /* Break out if chunk length is less then minimal. */
1048 if (ntohs(ch->length) < sizeof(sctp_chunkhdr_t))
1051 ch_end = ((__u8 *)ch) + WORD_ROUND(ntohs(ch->length));
1109 * that the chunk length doesn't cause overflow. Otherwise, we'll
1112 if (WORD_ROUND(ntohs(ch->length)) > skb->len)
H A Dipv6.c473 /* Initialize an address parameter from a sctp_addr and return the length
479 int length = sizeof(sctp_ipv6addr_param_t); local
482 param->v6.param_hdr.length = htons(length);
485 return length;
/net/netfilter/
H A Dxt_osf.c249 foptsize += f->opt[optnum].length;
260 __u32 len = f->opt[optnum].length;
/net/sunrpc/xprtrdma/
H A Dverbs.c211 dprintk("RPC: %s: rep %p status %X opcode %X length %u\n",
1577 if (req->rl_iov.length == 0) /* special case xprt_rdma_allocate() */
1623 iov->length = len;
1636 ipb.size = iov->length;
1641 "registered 0x%llx length %d\n",
1665 iov->addr, iov->length, DMA_BIDIRECTIONAL);
1762 fastreg_wr.wr.fast_reg.length = page_no << PAGE_SHIFT;
1763 if (fastreg_wr.wr.fast_reg.length < len) {
1986 req->rl_send_iov[3].addr, req->rl_send_iov[3].length,
1989 req->rl_send_iov[1].addr, req->rl_send_iov[1].length,
[all...]
H A Dtransport.c322 /* Set some length limits */
476 * Outgoing length shortage. Our inline write max must have
514 nreq->rl_iov.length = 0;
543 if (req->rl_iov.length == 0) { /* see allocate above */
566 if (req->rl_iov.length == 0) { /* see allocate above */
H A Drpc_rdma.c148 * of type RDMA_NOMSG carrying the xid and length. As a result, reply
283 * Marshal chunks. This routine returns the header length
503 /* new length after pullup */
537 req->rl_send_iov[0].length = hdrlen;
541 req->rl_send_iov[1].length = rpclen;
550 req->rl_send_iov[2].length = padlen;
554 req->rl_send_iov[3].length = rqst->rq_slen - rpclen;
564 * Chase down a received write or reply chunklist to get length
/net/wireless/
H A Dwext-compat.c152 data->length = sizeof(struct iw_range);
336 /* Fragment length must be even, so strip LSB. */
619 else if (erq->length == 0) {
634 params.key_len = erq->length;
635 if (erq->length == 5)
637 else if (erq->length == 13)
763 erq->length = 0;
767 erq->length = min_t(size_t, erq->length,
769 memcpy(keybuf, wdev->wext.keys->params[idx].key, erq->length);
[all...]
H A Dsme.c606 wrqu.data.length = req_ie_len;
612 wrqu.data.length = resp_ie_len;
678 * - and country_ie[1] which is the IE length
754 wrqu.data.length = req_ie_len;
761 wrqu.data.length = resp_ie_len;
/net/rds/
H A Dib_recv.c64 sge->length = sizeof(struct rds_header);
69 sge->length = RDS_FRAG_SIZE;
339 sge->length = sizeof(struct rds_header);
343 sge->length = ib_sg_dma_len(ic->i_cm_id->device, &recv->r_frag->f_sg);
537 sge->length = sizeof(struct rds_header);
H A Diw_recv.c100 sge->length = RDS_FRAG_SIZE;
105 sge->length = sizeof(struct rds_header);
195 sge->length = RDS_FRAG_SIZE;
199 sge->length = sizeof(struct rds_header);
368 sge->length = sizeof(struct rds_header);
/net/ipv6/
H A Draw.c555 total_len = inet_sk(sk)->cork.base.length;
611 static int rawv6_send_hdrinc(struct sock *sk, void *from, int length, argument
623 if (length > rt->dst.dev->mtu) {
631 length + hlen + tlen + 15,
643 skb_put(skb, length);
650 err = memcpy_fromiovecend((void *)iph, from, 0, length);
H A Dah6.c193 if (hao->length != sizeof(hao->addr)) {
194 net_warn_ratelimited("destopt hao: invalid header length: %u\n",
195 hao->length);
511 * as AH header length. Then copy back the copy as long as hdr_len
/net/sched/
H A Dsch_teql.c319 unsigned int length = qdisc_pkt_len(skb); local
328 master->tx_bytes += length;
/net/mac80211/
H A Dspectmgmt.c219 msr_report->u.action.u.measurement.length =
/net/atm/
H A Dmpc.c378 uint8_t length, mpoa_device_type, number_of_mps_macs; local
384 dprintk("total length of all TLVs %d\n", sizeoftlvs);
394 length = tlvs[4];
396 dprintk(" type 0x%x length %02x\n", type, length);
397 if (tlvs + length > end_of_tlvs) {
409 tlvs += length;
417 length < (42 + number_of_mps_macs*ETH_ALEN)) { /* :) */
423 length < 22 + number_of_mps_macs*ETH_ALEN) {
1343 tlv[4] = 1 + 1 + ATM_ESA_LEN; /* length */
[all...]
/net/rxrpc/
H A Drxkad.c361 /* remove the decrypted packet length */
446 /* remove the decrypted packet length */
704 sg[0].length = PAGE_SIZE - sg[0].offset;
705 sg_set_buf(&sg[1], buf + sg[0].length, buflen - sg[0].length);
711 ASSERTCMP(sg[0].length + sg[1].length, ==, buflen);
/net/ax25/
H A Daf_ax25.c686 int maxlen, length; local
698 length = min_t(unsigned int, maxlen, sizeof(int));
753 length = strlen(devname) + 1;
756 length = 1;
768 if (put_user(length, optlen))
771 return copy_to_user(optval, valptr, length) ? -EFAULT : 0;
/net/9p/
H A Dclient.c1714 "<<< mode=%8.8x atime=%8.8x mtime=%8.8x length=%llx\n"
1719 ret->atime, ret->mtime, (unsigned long long)ret->length,
1799 /* NOTE: size shouldn't include its own length */
1801 /* mode[4] atime[4] mtime[4] length[8]*/
1836 " mode=%8.8x atime=%8.8x mtime=%8.8x length=%llx\n"
1841 wst->atime, wst->mtime, (unsigned long long)wst->length,
2195 "start %lld length %lld proc_id %d client_id %s\n",
2197 flock->length, flock->proc_id, flock->client_id);
2200 flock->flags, flock->start, flock->length,
2228 "length
[all...]
H A Dprotocol.c211 &stbuf->mtime, &stbuf->length,
434 stbuf->mtime, stbuf->length,
H A Dtrans_rdma.c408 sge.length = client->msize;
499 sge.length = c->req->tc->size;
/net/core/
H A Dflow.c164 const u32 length = keysize * sizeof(flow_compare_t) / sizeof(u32); local
166 return jhash2(k, length, fcp->hash_rnd)

Completed in 341 milliseconds

12345