/net/sunrpc/auth_gss/ |
H A D | gss_generic_token.c | 59 (constructed, definite-length) 60 <length> possible multiple bytes, need to parse/generate 69 the sequence tag and length octets, the mech OID DER encoding, and the 76 der_length_size( int length) argument 78 if (length < (1<<7)) 80 else if (length < (1<<8)) 86 else if (length < (1<<16)) 88 else if (length < (1<<24)) 96 der_write_length(unsigned char **buf, int length) argument 98 if (length < ( [all...] |
H A D | gss_rpc_xdr.c | 78 u32 length; local 85 length = be32_to_cpup(p); 86 p = xdr_inline_decode(xdr, length); 94 if (length > buf->len) 98 buf->data = kmemdup(p, length, GFP_KERNEL); 102 memcpy(buf->data, p, length); 104 buf->len = length; 184 u32 length; local 194 length = be32_to_cpup(p); 196 if (length > ( 276 u32 length; local [all...] |
H A D | gss_krb5_crypto.c | 58 int length) 65 if (length % crypto_blkcipher_blocksize(tfm) != 0) 77 memcpy(out, in, length); 78 sg_init_one(sg, out, length); 80 ret = crypto_blkcipher_encrypt_iv(&desc, sg, sg, length); 92 int length) 99 if (length % crypto_blkcipher_blocksize(tfm) != 0) 110 memcpy(out, in, length); 111 sg_init_one(sg, out, length); 113 ret = crypto_blkcipher_decrypt_iv(&desc, sg, sg, length); 53 krb5_encrypt( struct crypto_blkcipher *tfm, void * iv, void * in, void * out, int length) argument 87 krb5_decrypt( struct crypto_blkcipher *tfm, void * iv, void * in, void * out, int length) argument [all...] |
/net/wireless/ |
H A D | wext-priv.c | 27 if (wrqu->data.length < dev->wireless_handlers->num_private_args) { 31 wrqu->data.length = dev->wireless_handlers->num_private_args; 36 wrqu->data.length = dev->wireless_handlers->num_private_args; 40 sizeof(struct iw_priv_args) * wrqu->data.length); 67 int num = iwp->length; 147 if (!iwp->pointer && iwp->length != 0) 150 if (iwp->length > (descr->set_args & IW_PRIV_SIZE_MASK)) 160 if (IW_IS_SET(cmd) && (iwp->length != 0)) { 172 /* Adjust for the actual length if it's variable, 232 iwp.length [all...] |
H A D | wext-spy.c | 52 if (wrqu->data.length > 0) { 56 for (i = 0; i < wrqu->data.length; i++) 68 spydata->spy_number = wrqu->data.length; 87 wrqu->data.length = spydata->spy_number; 170 wrqu.data.length = 1;
|
H A D | wext-core.c | 480 if (wrqu->data.length > descr->max_tokens) { 482 cmd, wrqu->data.length); 485 if (wrqu->data.length < descr->min_tokens) { 487 cmd, wrqu->data.length); 492 extra_len = wrqu->data.length * descr->token_size; 497 /* Total length of the event */ 582 compat_wrqu.length = wrqu->data.length; 641 wrqu->data.length = sizeof(struct iw_statistics); 704 if (iwp->length [all...] |
/net/sctp/ |
H A D | sm_make_chunk.c | 146 err.length = htons(len); 164 err.length = htons(len); 283 /* Add random parameter length*/ 286 /* Add HMACS parameter length if any were defined */ 288 if (auth_hmacs->length) 289 chunksize += WORD_ROUND(ntohs(auth_hmacs->length)); 293 /* Add CHUNKS parameter length */ 295 if (auth_chunks->length) 296 chunksize += WORD_ROUND(ntohs(auth_chunks->length)); 338 sat.param_hdr.length 2748 int length = sizeof(asconf) + vparam_len; local 2940 int length = sizeof(asconf) + vparam_len; local 3126 size_t length = ntohs(param.p->length); local 3189 int length = 0; local 3332 int length; local 3386 int length = 0; local [all...] |
H A D | auth.c | 72 /* Create a new key structure of a given length */ 143 * If the key vectors are equal as numbers but differ in length ... 180 * These parameters include the parameter type, parameter length, and 198 random_len = ntohs(random->param_hdr.length); 199 hmacs_len = ntohs(hmacs->param_hdr.length); 201 chunks_len = ntohs(chunks->param_hdr.length); 307 * These parameters include the parameter type, parameter length, and 328 * but differ in length, then the concatenation order is the 465 * length fields set, so that we can allocated and use 535 n_elt = (ntohs(hmacs->param_hdr.length) [all...] |
/net/ceph/ |
H A D | ceph_hash.c | 23 unsigned int ceph_str_hash_rjenkins(const char *str, unsigned int length) argument 30 len = length; 49 c = c + length; 57 /* the first byte of c is reserved for the length */ 84 unsigned int ceph_str_hash_linux(const char *str, unsigned int length) argument 89 while (length--) {
|
H A D | pagelist.c | 59 memcpy(pl->mapped_tail + (pl->length & ~PAGE_CACHE_MASK), 61 pl->length += bit; 70 memcpy(pl->mapped_tail + (pl->length & ~PAGE_CACHE_MASK), buf, len); 71 pl->length += len;
|
H A D | messenger.c | 532 int page_offset, size_t length) 537 BUG_ON(page_offset + length > PAGE_SIZE); 541 ret = ceph_tcp_recvmsg(sock, kaddr + page_offset, length); 798 size_t length) 808 cursor->resid = min(length, data->bio_length); 817 size_t *length) 833 *length = cursor->resid; 835 *length = (size_t) bio_vec.bv_len; 836 BUG_ON(*length > cursor->resid); 837 BUG_ON(*page_offset + *length > PAGE_SIZ 531 ceph_tcp_recvpage(struct socket *sock, struct page *page, int page_offset, size_t length) argument 797 ceph_msg_data_bio_cursor_init(struct ceph_msg_data_cursor *cursor, size_t length) argument 815 ceph_msg_data_bio_next(struct ceph_msg_data_cursor *cursor, size_t *page_offset, size_t *length) argument 893 ceph_msg_data_pages_cursor_init(struct ceph_msg_data_cursor *cursor, size_t length) argument 915 ceph_msg_data_pages_next(struct ceph_msg_data_cursor *cursor, size_t *page_offset, size_t *length) argument 965 ceph_msg_data_pagelist_cursor_init(struct ceph_msg_data_cursor *cursor, size_t length) argument 990 ceph_msg_data_pagelist_next(struct ceph_msg_data_cursor *cursor, size_t *page_offset, size_t *length) argument 1058 size_t length = cursor->total_resid; local 1080 ceph_msg_data_cursor_init(struct ceph_msg *msg, size_t length) argument 1102 ceph_msg_data_next(struct ceph_msg_data_cursor *cursor, size_t *page_offset, size_t *length, bool *last_piece) argument 1480 ceph_crc32c_page(u32 crc, struct page *page, unsigned int page_offset, unsigned int length) argument 1524 size_t length; local 2208 size_t length; local 3091 ceph_msg_data_add_pages(struct ceph_msg *msg, struct page **pages, size_t length, size_t alignment) argument 3128 ceph_msg_data_add_bio(struct ceph_msg *msg, struct bio *bio, size_t length) argument [all...] |
H A D | osd_client.c | 95 struct page **pages, u64 length, u32 alignment, 100 osd_data->length = length; 155 u64 length, u32 alignment, 161 ceph_osd_data_pages_init(osd_data, pages, length, alignment, 168 u64 length, u32 alignment, 174 ceph_osd_data_pages_init(osd_data, pages, length, alignment, 223 unsigned int which, struct page **pages, u64 length, 229 ceph_osd_data_pages_init(osd_data, pages, length, alignment, 235 unsigned int which, struct page **pages, u64 length, 94 ceph_osd_data_pages_init(struct ceph_osd_data *osd_data, struct page **pages, u64 length, u32 alignment, bool pages_from_pool, bool own_pages) argument 153 osd_req_op_raw_data_in_pages(struct ceph_osd_request *osd_req, unsigned int which, struct page **pages, u64 length, u32 alignment, bool pages_from_pool, bool own_pages) argument 166 osd_req_op_extent_osd_data_pages(struct ceph_osd_request *osd_req, unsigned int which, struct page **pages, u64 length, u32 alignment, bool pages_from_pool, bool own_pages) argument 222 osd_req_op_cls_request_data_pages(struct ceph_osd_request *osd_req, unsigned int which, struct page **pages, u64 length, u32 alignment, bool pages_from_pool, bool own_pages) argument 234 osd_req_op_cls_response_data_pages(struct ceph_osd_request *osd_req, unsigned int which, struct page **pages, u64 length, u32 alignment, bool pages_from_pool, bool own_pages) argument 470 osd_req_op_extent_init(struct ceph_osd_request *osd_req, unsigned int which, u16 opcode, u64 offset, u64 length, u64 truncate_size, u32 truncate_seq) argument 493 osd_req_op_extent_update(struct ceph_osd_request *osd_req, unsigned int which, u64 length) argument 586 u64 length = ceph_osd_data_length(osd_data); local [all...] |
/net/nfc/ |
H A D | llcp_commands.c | 93 u8 *tlv, length; local 100 length = llcp_tlv_length[type]; 101 if (length == 0 && value_length == 0) 103 else if (length == 0) 104 length = value_length; 106 *tlv_length = 2 + length; 107 tlv = kzalloc(2 + length, GFP_KERNEL); 112 tlv[1] = length; 113 memcpy(tlv + 2, value, length); 203 u8 *tlv = tlv_array, type, length, offse local 252 u8 *tlv = tlv_array, type, length, offset = 0; local [all...] |
/net/atm/ |
H A D | lec_arpc.h | 47 * the length of the tlvs array 59 u8 length; member in struct:tlv
|
H A D | proc.c | 381 int length; local 390 length = -EINVAL; 392 length = dev->ops->proc_read(dev, pos, (char *)page); 393 if (length > count) 394 length = -EINVAL; 396 if (length >= 0) { 397 if (copy_to_user(buf, (char *)page, length)) 398 length = -EFAULT; 402 return length;
|
H A D | ioctl.c | 257 if (get_user(len, &iobuf32->length) || 261 if (put_user(len, &iobuf->length) || 268 if (copy_in_user(&iobuf32->length, &iobuf->length, 298 if (copy_in_user(&sioc32->length, &sioc->length,
|
H A D | resources.c | 215 iobuf_len = &ciobuf->length; 222 iobuf_len = &iobuf->length; 260 sioc_len = &csioc->length; 265 if (get_user(len, &csioc->length)) 273 sioc_len = &sioc->length; 276 if (get_user(len, &sioc->length)) 397 write the length" */
|
/net/rds/ |
H A D | tcp_send.c | 123 rm->data.op_sg[sg].length - off, 126 rm->data.op_sg[sg].offset + off, rm->data.op_sg[sg].length - off, 133 if (off == rm->data.op_sg[sg].length) {
|
H A D | message.c | 156 /* Get the extension type and length. For now, the 157 * length is implied by the extension type. */ 302 to_copy = min(iov->iov_len - iov_off, sg->length - sg_off); 308 (void *)sg_page(sg), sg->offset, sg->length, sg_off); 320 if (sg_off == sg->length) 356 to_copy = min(iov->iov_len - iov_off, sg->length - vec_off); 363 sg_page(sg), sg->offset, sg->length, vec_off); 377 if (vec_off == sg->length) {
|
/net/netfilter/ |
H A D | nf_synproxy_core.c | 31 int length = (th->doff * 4) - sizeof(*th); local 34 ptr = skb_header_pointer(skb, doff + sizeof(*th), length, buf); 39 while (length > 0) { 47 length--; 53 if (opsize > length) 85 length -= opsize;
|
H A D | nf_conntrack_ftp.c | 152 /* Returns 0, or length of numbers: 192,168,1,1,5,6 */ 157 int length; local 160 length = try_number(data, dlen, array, 6, ',', term); 161 if (length == 0) 167 return length; 223 /* Returns 0, or length of numbers: |1|132.235.1.2|6275| or |2|3ffe::1|6275| */ 228 int length; local 254 length = try_number(data + 3, dlen - 3, array, 4, '.', delim); 255 if (length != 0) 260 length [all...] |
/net/mac80211/ |
H A D | aes_ccm.c | 41 aead_request_set_assoc(aead_req, &assoc, assoc.length); 68 aead_request_set_assoc(aead_req, &assoc, assoc.length);
|
/net/bridge/ |
H A D | br_stp_bpdu.c | 34 const unsigned char *data, int length) 38 skb = dev_alloc_skb(length+LLC_RESERVE); 47 memcpy(__skb_put(skb, length), data, length); local 33 br_send_bpdu(struct net_bridge_port *p, const unsigned char *data, int length) argument
|
/net/ipv4/ |
H A D | ip_output.c | 225 /* Slowpath - GSO segment length is exceeding the dst MTU. 787 void *from, int length, int hh_len, int fragheaderlen, 826 /* specify the length of each IP datagram fragment */ 832 (length - transhdrlen)); 842 void *from, int length, int transhdrlen, 874 if (cork->length + length > maxnonfragsize - fragheaderlen) { 885 length + fragheaderlen <= mtu && 890 cork->length += length; 783 ip_ufo_append_data(struct sock *sk, struct sk_buff_head *queue, int getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb), void *from, int length, int hh_len, int fragheaderlen, int transhdrlen, int maxfraglen, unsigned int flags) argument 835 __ip_append_data(struct sock *sk, struct flowi4 *fl4, struct sk_buff_head *queue, struct inet_cork *cork, struct page_frag *pfrag, int getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb), void *from, int length, int transhdrlen, unsigned int flags) argument 1134 ip_append_data(struct sock *sk, struct flowi4 *fl4, int getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb), void *from, int length, int transhdrlen, struct ipcm_cookie *ipc, struct rtable **rtp, unsigned int flags) argument 1458 ip_make_skb(struct sock *sk, struct flowi4 *fl4, int getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb), void *from, int length, int transhdrlen, struct ipcm_cookie *ipc, struct rtable **rtp, unsigned int flags) argument [all...] |
/net/ipv6/ |
H A D | ip6_output.c | 1046 void *from, int length, int hh_len, int fragheaderlen, 1087 /* Specify the length of each IPv6 datagram fragment. 1098 (length - transhdrlen)); 1139 void *from, int length, int transhdrlen, 1216 cork->length = 0; 1218 length += exthdrlen; 1254 if ((cork->length + length > mtu - headersize) && dontfrag && 1262 if (cork->length + length > maxnonfragsiz 1043 ip6_ufo_append_data(struct sock *sk, int getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb), void *from, int length, int hh_len, int fragheaderlen, int transhdrlen, int mtu, unsigned int flags, struct rt6_info *rt) argument 1137 ip6_append_data(struct sock *sk, int getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb), void *from, int length, int transhdrlen, int hlimit, int tclass, struct ipv6_txoptions *opt, struct flowi6 *fl6, struct rt6_info *rt, unsigned int flags, int dontfrag) argument [all...] |