/linux-master/net/dccp/ |
H A D | feat.c | 1025 static int dccp_feat_preflist_match(u8 *servlist, u8 slen, u8 *clilist, u8 clen) argument 1029 for (s = 0; s < slen; s++)
|
H A D | proto.c | 593 int err = -ENOENT, slen = 0, total_len = sizeof(u32); local 597 slen = sl->dccpsl_nr * sizeof(u32); 598 total_len += slen; 608 (sl != NULL && copy_to_user(optval + 1, sl->dccpsl_list, slen)))
|
/linux-master/net/dns_resolver/ |
H A D | dns_key.c | 252 int slen, dlen, ret = 0; local 263 slen = strlen(src); 265 if (slen <= 0 || dlen <= 0) 267 if (src[slen - 1] == '.') 268 slen--; 271 if (slen != dlen || strncasecmp(src, dsp, slen) != 0)
|
/linux-master/net/ieee802154/ |
H A D | header_ops.c | 252 int dlen, slen; local 255 slen = ieee802154_hdr_addr_len(hdr->fc.source_addr_mode, 258 if (slen < 0 || dlen < 0) 261 return 3 + dlen + slen + hdr->fc.security_enabled;
|
/linux-master/net/ipv4/ |
H A D | fib_semantics.c | 2058 u8 slen = 32 - res->prefixlen; local 2068 if (fa->fa_slen != slen)
|
H A D | fib_trie.c | 125 unsigned char slen; member in struct:key_vector 368 l->slen = fa->fa_slen; 402 tn->slen = pos; 441 if (n && (tn->slen < n->slen)) 442 tn->slen = n->slen; 711 unsigned char slen = tn->pos; local 719 slen_max = min_t(unsigned char, tn->pos + tn->bits - 1, tn->slen); 729 if (!n || (n->slen < 913 node_pull_suffix(struct key_vector *tn, unsigned char slen) argument 927 node_push_suffix(struct key_vector *tn, unsigned char slen) argument 983 fib_find_alias(struct hlist_head *fah, u8 slen, dscp_t dscp, u32 prio, u32 tb_id, bool find_first) argument 1019 u8 slen = KEYLENGTH - fri->dst_len; local 1225 u8 slen = KEYLENGTH - plen; local 1689 u8 slen = fa_to_delete->fa_slen; local 1720 u8 slen = KEYLENGTH - plen; local 1969 unsigned char slen = 0; local 2040 unsigned char slen = 0; local [all...] |
H A D | route.c | 3350 u8 slen = 32 - fri.dst_len; local 3352 if (fa->fa_slen == slen &&
|
/linux-master/net/ipv6/ |
H A D | seg6.c | 161 u8 slen; local 171 slen = nla_get_u8(info->attrs[SEG6_ATTR_SECRETLEN]); 177 if (slen > SEG6_HMAC_SECRET_LEN) 183 if (!slen) { 194 if (slen > nla_len(info->attrs[SEG6_ATTR_SECRET])) { 213 memcpy(hinfo->secret, secret, slen); 214 hinfo->slen = slen; 305 nla_put_u8(msg, SEG6_ATTR_SECRETLEN, hinfo->slen) || 306 nla_put(msg, SEG6_ATTR_SECRET, hinfo->slen, hinf [all...] |
H A D | seg6_hmac.c | 139 ret = crypto_shash_setkey(tfm, hinfo->secret, hinfo->slen);
|
/linux-master/net/netfilter/ |
H A D | nf_conntrack_sip.c | 418 hdr->slen); 421 dptr += hdr->slen; 450 dptr = ct_sip_header_search(dptr, limit, hdr->search, hdr->slen); 453 dptr += hdr->slen; 765 hdr->slen); 768 dptr += hdr->slen;
|
/linux-master/net/sched/ |
H A D | sch_cake.c | 1745 unsigned int slen = 0, numsegs = 0; local 1761 slen += segs->len; 1767 b->bytes += slen; 1768 b->backlogs[idx] += slen; 1769 b->tin_backlog += slen; 1770 sch->qstats.backlog += slen; 1771 q->avg_window_bytes += slen; 1773 qdisc_tree_reduce_backlog(sch, 1-numsegs, len-slen);
|
H A D | sch_taprio.c | 581 unsigned int slen = 0, numsegs = 0, len = qdisc_pkt_len(skb); local 593 slen += segs->len; 612 qdisc_tree_reduce_backlog(sch, 1 - numsegs, len - slen);
|
/linux-master/net/sunrpc/ |
H A D | svc_xprt.c | 138 int slen; local 140 slen = snprintf(tmpstr, sizeof(tmpstr), "%s %d\n", 142 if (slen >= sizeof(tmpstr) || len + slen >= maxlen) 144 len += slen;
|
H A D | svcsock.c | 889 int err, slen; local 911 slen = err; 927 svc_xprt_set_remote(&newsvsk->sk_xprt, sin, slen); 929 slen = err; 931 slen = offsetof(struct sockaddr, sa_data); 932 svc_xprt_set_local(&newsvsk->sk_xprt, sin, slen);
|
/linux-master/samples/bpf/ |
H A D | cookie_uid_helper_example.c | 228 socklen_t slen = sizeof(si_other); local 250 (struct sockaddr *)&si_other, slen); 256 (struct sockaddr *)&si_me, &slen);
|
/linux-master/scripts/basic/ |
H A D | fixdep.c | 170 static void use_config(const char *m, int slen) argument 172 if (in_hashtable(m, slen, config_hashtab)) 176 printf(" $(wildcard include/config/%.*s) \\\n", slen, m); 180 static int str_ends_with(const char *s, int slen, const char *sub) argument 184 if (sublen > slen) 187 return !memcmp(s + slen - sublen, sub, sublen);
|
/linux-master/scripts/dtc/libfdt/ |
H A D | fdt_ro.c | 108 int slen; local 109 const char *p = fdt_get_string(fdt, stroffset, &slen); 111 return p && (slen == len) && (memcmp(p, s, len) == 0);
|
/linux-master/security/apparmor/ |
H A D | apparmorfs.c | 1316 static int decompress_zstd(char *src, size_t slen, char *dst, size_t dlen) argument 1318 if (slen < dlen) { 1335 out_len = zstd_decompress_dctx(ctx, dst, dlen, src, slen); 1345 if (dlen < slen) 1347 memcpy(dst, src, slen);
|
H A D | lsm.c | 1338 int slen, error = 0; local 1348 slen = aa_label_asxprint(&name, labels_ns(label), peer, 1351 /* don't include terminating \0 in slen, it breaks some apps */ 1352 if (slen < 0) { 1356 if (slen > len) { 1361 if (copy_to_sockptr(optval, name, slen)) 1364 if (copy_to_sockptr(optlen, &slen, sizeof(slen)))
|
H A D | policy_unpack.c | 1292 static int compress_zstd(const char *src, size_t slen, char **dst, size_t *dlen) argument 1296 zstd_get_params(aa_g_rawdata_compression_level, slen); 1300 size_t out_len = zstd_compress_bound(slen); 1322 out_len = zstd_compress_cctx(ctx, out, out_len, src, slen, ¶ms); 1323 if (zstd_is_error(out_len) || out_len >= slen) { 1360 *dlen = slen;
|
/linux-master/security/selinux/ss/ |
H A D | services.c | 1646 u32 slen, tlen, nlen; local 1649 if (sidtab_entry_to_string(policydb, sidtab, sentry, &s, &slen))
|
/linux-master/security/smack/ |
H A D | smack_lsm.c | 3686 int slen; local 3695 slen = strlen(cp); 3697 return slen; 4243 u32 slen = 1; local 4249 slen = strlen(rcp) + 1; 4251 if (slen > len) { 4256 if (copy_to_sockptr(optval, rcp, slen)) 4259 if (copy_to_sockptr(optlen, &slen, sizeof(slen)))
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | cls_redirect.c | 66 socklen_t slen = sizeof(ss); local 73 if (CHECK_FAIL(getsockname(*server, sa, &slen))) 76 *conn = connect_to_addr(type, (struct sockaddr_storage *)sa, slen, NULL); 83 slen = sizeof(ss); 84 if (CHECK_FAIL(getsockname(*conn, sa, &slen))) 90 slen = sizeof(ss); 91 if (CHECK_FAIL(getpeername(*conn, sa, &slen))) 343 socklen_t slen; local 351 slen = prepare_addr(&ss, families[i]); 352 if (CHECK_FAIL(!slen)) [all...] |
H A D | sk_assign.c | 79 socklen_t slen = sizeof(ss); local 82 if (CHECK_FAIL(getsockname(fd, (struct sockaddr *)&ss, &slen)))
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | test_progs.c | 1481 size_t slen; local 1484 slen = log_cnt; 1485 while (slen) { 1493 len = slen >= MAX_LOG_TRUNK_SIZE ? MAX_LOG_TRUNK_SIZE : slen; 1497 slen -= len; 1498 if (!slen)
|