/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/sunrpc/ |
H A D | gss_asn1.h | 70 int *body_size, 76 unsigned int body_size); 80 int body_size,
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sunrpc/auth_gss/ |
H A D | gss_generic_token.c | 143 g_token_size(struct xdr_netobj *mech, unsigned int body_size) argument 145 /* set body_size to sequence contents size */ 146 body_size += 2 + (int) mech->len; /* NEED overflow check */ 147 return(1 + der_length_size(body_size) + body_size); 156 g_make_token_header(struct xdr_netobj *mech, int body_size, unsigned char **buf) argument 159 der_write_length(buf, 2 + mech->len + body_size); 169 * leaving buf advanced past the token header, and setting body_size 173 * *body_size are left unmodified on error. 176 g_verify_token_header(struct xdr_netobj *mech, int *body_size, argument [all...] |
H A D | gss_krb5_seal.c | 77 int body_size = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; local 79 token->len = g_token_size(&ctx->mech_used, body_size); 82 g_make_token_header(&ctx->mech_used, body_size, (unsigned char **)&ptr);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/libevent-2.0.20-stable/include/event2/ |
H A D | http_struct.h | 95 size_t body_size; member in struct:evhttp_request
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libav-0.8.8/libavformat/ |
H A D | iff.c | 76 uint32_t body_size; member in struct:__anon2160 152 iff->body_size = data_size; 274 if(iff->sent_bytes >= iff->body_size) 277 ret = av_get_packet(pb, pkt, iff->body_size); 283 iff->sent_bytes = iff->body_size;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ecryptfs/ |
H A D | keystore.c | 1125 size_t body_size; local 1167 rc = ecryptfs_parse_packet_length(&data[(*packet_size)], &body_size, 1174 if (unlikely(body_size < (ECRYPTFS_SIG_SIZE + 2))) { 1175 printk(KERN_WARNING "Invalid body size ([%td])\n", body_size); 1180 if (unlikely((*packet_size) + body_size > max_packet_size)) { 1198 body_size - (ECRYPTFS_SIG_SIZE + 2); 1207 &data[(*packet_size)], (body_size - (ECRYPTFS_SIG_SIZE + 2))); 1257 size_t body_size; local 1301 rc = ecryptfs_parse_packet_length(&data[(*packet_size)], &body_size, 1308 if (unlikely(body_size < (ECRYPTFS_SALT_SIZ 1430 size_t body_size; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/message/i2o/ |
H A D | memory.c | 26 * @body_size: maximum body size used for message in 32-bit words. 30 u16 i2o_sg_tablesize(struct i2o_controller *c, u16 body_size) argument 35 body_size;
|
H A D | i2o_scsi.c | 105 u16 body_size = 6; local 109 body_size = 8; 137 scsi_host->sg_tablesize = i2o_sg_tablesize(c, body_size);
|
H A D | i2o_block.c | 1040 u16 body_size = 4; local 1046 body_size = 8; 1087 blk_queue_max_segments(queue, i2o_sg_tablesize(c, body_size));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/libavformat/ |
H A D | iff.c | 104 uint32_t body_size; member in struct:__anon3507 418 iff->body_size = data_size; 712 ret = av_get_packet(pb, pkt, iff->body_size); 717 if (av_new_packet(pkt, iff->body_size + 2) < 0) { 723 ret = avio_read(pb, buf, iff->body_size); 726 } else if (ret < iff->body_size)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/libevent-2.0.20-stable/ |
H A D | http.c | 884 /* ntoread is signed int64, body_size is unsigned size_t, check for under/overflow conditions */ 885 if ((ev_uint64_t)ntoread > EV_SIZE_MAX - req->body_size) { 889 if (req->body_size + (size_t)ntoread > req->evcon->max_body_size) { 895 req->body_size += (size_t)ntoread; 982 if ((size_t)(req->body_size + evbuffer_get_length(buf)) < req->body_size) { 987 req->body_size += evbuffer_get_length(buf); 998 req->body_size += n; 1002 if (req->body_size > req->evcon->max_body_size || 3462 req->body_size [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/ |
H A D | i2o.h | 693 extern u16 i2o_sg_tablesize(struct i2o_controller *c, u16 body_size);
|