Lines Matching defs:tcp

1702 	const struct wiphy_wowlan_tcp_support *tcp = rdev->wiphy.wowlan->tcp;
1705 if (!tcp)
1714 tcp->data_payload_max))
1718 tcp->data_payload_max))
1721 if (tcp->seq && nla_put_flag(msg, NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ))
1724 if (tcp->tok && nla_put(msg, NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN,
1725 sizeof(*tcp->tok), tcp->tok))
1729 tcp->data_interval_max))
1733 tcp->wake_payload_max))
13187 struct cfg80211_wowlan_tcp *tcp)
13191 if (!tcp)
13199 if (nla_put_in_addr(msg, NL80211_WOWLAN_TCP_SRC_IPV4, tcp->src) ||
13200 nla_put_in_addr(msg, NL80211_WOWLAN_TCP_DST_IPV4, tcp->dst) ||
13201 nla_put(msg, NL80211_WOWLAN_TCP_DST_MAC, ETH_ALEN, tcp->dst_mac) ||
13202 nla_put_u16(msg, NL80211_WOWLAN_TCP_SRC_PORT, tcp->src_port) ||
13203 nla_put_u16(msg, NL80211_WOWLAN_TCP_DST_PORT, tcp->dst_port) ||
13205 tcp->payload_len, tcp->payload) ||
13207 tcp->data_interval) ||
13209 tcp->wake_len, tcp->wake_data) ||
13211 DIV_ROUND_UP(tcp->wake_len, 8), tcp->wake_mask))
13214 if (tcp->payload_seq.len &&
13216 sizeof(tcp->payload_seq), &tcp->payload_seq))
13219 if (tcp->payload_tok.len &&
13221 sizeof(tcp->payload_tok) + tcp->tokens_size,
13222 &tcp->payload_tok))
13330 if (rdev->wiphy.wowlan_config && rdev->wiphy.wowlan_config->tcp) {
13332 size += rdev->wiphy.wowlan_config->tcp->tokens_size +
13333 rdev->wiphy.wowlan_config->tcp->payload_len +
13334 rdev->wiphy.wowlan_config->tcp->wake_len +
13335 rdev->wiphy.wowlan_config->tcp->wake_len / 8;
13375 rdev->wiphy.wowlan_config->tcp))
13406 if (!rdev->wiphy.wowlan->tcp)
13425 if (data_size > rdev->wiphy.wowlan->tcp->data_payload_max)
13429 rdev->wiphy.wowlan->tcp->data_interval_max ||
13434 if (wake_size > rdev->wiphy.wowlan->tcp->wake_payload_max)
13449 if (!rdev->wiphy.wowlan->tcp->tok)
13451 if (tok->len > rdev->wiphy.wowlan->tcp->tok->max_len)
13453 if (tok->len < rdev->wiphy.wowlan->tcp->tok->min_len)
13455 if (tokens_size > rdev->wiphy.wowlan->tcp->tok->bufsize)
13463 if (!rdev->wiphy.wowlan->tcp->seq)
13535 trig->tcp = cfg;
13771 if (new_triggers.tcp && new_triggers.tcp->sock)
13772 sock_release(new_triggers.tcp->sock);
13773 kfree(new_triggers.tcp);