/linux-master/net/tls/ |
H A D | tls_device_fallback.c | 177 int datalen = skb->len - headln; local 194 datalen, IPPROTO_TCP, 0); 197 th->check = ~csum_tcpudp_magic(iph->saddr, iph->daddr, datalen,
|
/linux-master/fs/bcachefs/ |
H A D | bkey_methods.c | 94 unsigned datalen = bkey_inline_data_bytes(k.k); local 96 prt_printf(out, "datalen %u: %*phN", 97 datalen, min(datalen, 32U), d.v->data);
|
H A D | reflink.c | 325 unsigned datalen = bkey_inline_data_bytes(k.k); local 327 prt_printf(out, "refcount %llu datalen %u: %*phN", 328 le64_to_cpu(d.v->refcount), datalen, 329 min(datalen, 32U), d.v->data);
|
/linux-master/net/rxrpc/ |
H A D | server_key.c | 73 _enter("%zu", prep->datalen);
|
/linux-master/fs/smb/client/ |
H A D | cifs_spnego.c | 31 payload = kmemdup(prep->data, prep->datalen, GFP_KERNEL);
|
/linux-master/drivers/nvme/common/ |
H A D | keyring.c | 26 seq_printf(m, ": %u", key->datalen);
|
/linux-master/net/sched/ |
H A D | em_text.c | 92 m->datalen = sizeof(*tm);
|
H A D | em_canid.c | 178 m->datalen = sizeof(struct canid_match) + len;
|
/linux-master/include/uapi/linux/ |
H A D | if_tunnel.h | 102 __u32 datalen; member in struct:ip_tunnel_prl
|
/linux-master/crypto/asymmetric_keys/ |
H A D | pkcs7_verify.c | 468 * @datalen: The amount of data 478 const void *data, size_t datalen) 485 pkcs7->data_len = datalen; 477 pkcs7_supply_detached_data(struct pkcs7_message *pkcs7, const void *data, size_t datalen) argument
|
/linux-master/net/mac80211/ |
H A D | fils_aead.c | 237 if (!session || session->datalen != 1 + 8) 287 if (!session || session->datalen != 1 + 8) {
|
/linux-master/drivers/gpu/drm/i915/gt/uc/ |
H A D | intel_guc_ct.c | 1045 u32 datalen = len - GUC_HXG_MSG_MIN_LEN; local 1066 if (unlikely(datalen > req->response_len)) { 1067 CT_ERROR(ct, "Response %u too long (datalen %u > %u)\n", 1068 req->fence, datalen, req->response_len); 1069 datalen = min(datalen, req->response_len); 1072 if (datalen) 1073 memcpy(req->response_buf, data, 4 * datalen); 1074 req->response_len = datalen;
|
/linux-master/tools/testing/selftests/net/netfilter/ |
H A D | ipvs.sh | 45 readonly datalen=32 85 dd if=/dev/urandom of="${infile}" bs="${datalen}" count=1 status=none
|
/linux-master/drivers/macintosh/ |
H A D | smu.c | 718 cmd->info.datalen); 867 if (cmd->info.datalen > SMU_I2C_READ_MAX) 869 memset(cmd->info.data, 0xff, cmd->info.datalen); 872 if (cmd->info.datalen > SMU_I2C_WRITE_MAX) 874 cmd->scmd.data_len = 9 + cmd->info.datalen; 879 cmd->read ? "read" : "write", cmd->info.datalen,
|
/linux-master/fs/crypto/ |
H A D | keyring.c | 586 if (prep->datalen < sizeof(*payload) + FSCRYPT_MIN_KEY_SIZE || 587 prep->datalen > sizeof(*payload) + FSCRYPT_MAX_KEY_SIZE) 597 prep->payload.data[0] = kmemdup(payload, prep->datalen, GFP_KERNEL); 601 prep->quotalen = prep->datalen; 619 seq_printf(m, ": %u [%u]", key->datalen, payload->type); 673 secret->size = key->datalen - sizeof(*payload);
|
/linux-master/drivers/media/pci/saa7164/ |
H A D | saa7164-api.c | 1352 u32 datalen, u8 *data) 1360 dprintk(DBGLVL_API, "%s() addr=%x reglen=%d datalen=%d\n", 1361 __func__, addr, reglen, datalen); 1374 *((u32 *)(buf + 1 * sizeof(u32))) = datalen; 1405 memcpy(data, (buf + 2 * sizeof(u32) + reglen), datalen); 1412 int saa7164_api_i2c_write(struct saa7164_i2c *bus, u8 addr, u32 datalen, argument 1423 __func__, addr, datalen); 1425 if ((datalen == 0) || (datalen > 232)) 1462 *((u32 *)(buf + 1 * sizeof(u32))) = datalen 1351 saa7164_api_i2c_read(struct saa7164_i2c *bus, u8 addr, u32 reglen, u8 *reg, u32 datalen, u8 *data) argument [all...] |
H A D | saa7164.h | 519 u32 datalen, u8 *data); 521 u32 datalen, u8 *data); 523 u32 datalen, u8 *data);
|
/linux-master/drivers/crypto/amcc/ |
H A D | crypto4xx_core.c | 681 const unsigned int datalen, 698 unsigned int nbytes = datalen; 718 && (datalen % AES_BLOCK_SIZE); 721 tmp = sg_nents_for_len(src, assoclen + datalen); 739 if (datalen > PPC4XX_SD_BUFFER_SIZE) { 740 num_sd = datalen / PPC4XX_SD_BUFFER_SIZE; 741 if (datalen % PPC4XX_SD_BUFFER_SIZE) 879 min(datalen, dst->length), 886 nbytes = datalen; 921 pd->pd_ctl_len.w = 0x00400000 | (assoclen + datalen); 677 crypto4xx_build_pd(struct crypto_async_request *req, struct crypto4xx_ctx *ctx, struct scatterlist *src, struct scatterlist *dst, const unsigned int datalen, const __le32 *iv, const u32 iv_len, const struct dynamic_sa_ctl *req_sa, const unsigned int sa_len, const unsigned int assoclen, struct scatterlist *_dst) argument [all...] |
/linux-master/drivers/scsi/ |
H A D | libiscsi.c | 693 "datalen %d]\n", hdr->opcode & ISCSI_OPCODE_MASK, 864 * @datalen: len of buffer 871 int datalen) 911 if (datalen < 2) { 915 "buffer size of %d\n", datalen); 921 if (datalen < senselen) 1064 * @datalen: length of data 1070 struct iscsi_nopin *nop, char *data, int datalen) 1081 data, datalen)) 1090 char *data, int datalen) 869 iscsi_scsi_cmd_rsp(struct iscsi_conn *conn, struct iscsi_hdr *hdr, struct iscsi_task *task, char *data, int datalen) argument 1069 iscsi_nop_out_rsp(struct iscsi_task *task, struct iscsi_nopin *nop, char *data, int datalen) argument 1089 iscsi_handle_reject(struct iscsi_conn *conn, struct iscsi_hdr *hdr, char *data, int datalen) argument 1212 __iscsi_complete_pdu(struct iscsi_conn *conn, struct iscsi_hdr *hdr, char *data, int datalen) argument 1353 iscsi_complete_pdu(struct iscsi_conn *conn, struct iscsi_hdr *hdr, char *data, int datalen) argument [all...] |
H A D | aha1740.c | 415 cptr[i].datalen = sg_dma_len (sg); 418 host->ecb[ecbno].datalen = nseg * sizeof(struct aha1740_chain); 426 host->ecb[ecbno].datalen = 0;
|
/linux-master/drivers/mtd/nand/spi/ |
H A D | core.c | 370 if (req->datalen) { 402 if (req->datalen) 404 req->datalen); 443 if (req->datalen) 445 req->datalen); 670 ops->retlen += iter.req.datalen; 715 ops->retlen += iter.req.datalen;
|
/linux-master/crypto/ |
H A D | af_alg.c | 234 unsigned int *datalen) 242 *datalen = key->datalen; 248 unsigned int *datalen) 256 *datalen = ekp->decrypted_datalen; 262 unsigned int *datalen) 270 *datalen = tkp->key_len; 233 key_data_ptr_user(const struct key *key, unsigned int *datalen) argument 247 key_data_ptr_encrypted(const struct key *key, unsigned int *datalen) argument 261 key_data_ptr_trusted(const struct key *key, unsigned int *datalen) argument
|
/linux-master/drivers/nfc/pn533/ |
H A D | pn533.c | 236 static u8 pn533_std_data_checksum(u8 *data, int datalen) argument 241 for (i = 0; i < datalen; i++) 255 frame->datalen = 2; 262 frame->datalen_checksum = pn533_std_checksum(frame->datalen); 265 pn533_std_data_checksum(frame->data, frame->datalen); 274 frame->datalen += len; 289 checksum = pn533_std_checksum(stdf->datalen); 293 checksum = pn533_std_data_checksum(stdf->data, stdf->datalen); 302 checksum = pn533_ext_checksum(be16_to_cpu(eif->datalen)); 308 be16_to_cpu(eif->datalen)); [all...] |
/linux-master/net/sctp/ |
H A D | ulpevent.c | 682 size_t padding, datalen; local 695 datalen = ntohs(chunk->chunk_hdr->length); 697 if (rx_count >= sk->sk_rcvbuf || !sk_rmem_schedule(sk, skb, datalen)) 725 padding = SCTP_PAD4(datalen) - datalen;
|
/linux-master/drivers/crypto/bcm/ |
H A D | cipher.c | 141 u32 datalen; /* Number of bytes of response data expected */ local 160 datalen = spu_msg_sg_add(&sg, &rctx->dst_sg, &rctx->dst_skip, 162 if (datalen < chunksize) { 163 pr_err("%s(): failed to copy dst sg to mbox msg. chunksize %u, datalen %u", 164 __func__, chunksize, datalen); 204 u32 datalen; /* Number of bytes of response data expected */ local 224 datalen = spu_msg_sg_add(&sg, &rctx->src_sg, &rctx->src_skip, 226 if (unlikely(datalen < chunksize)) { 586 u32 datalen; /* Number of bytes of response data expected */ local 605 datalen 1052 u32 datalen; /* Number of bytes of response data expected */ local 1176 u32 datalen; /* Number of bytes of data to write */ local [all...] |