Searched refs:body_size (Results 1 - 12 of 12) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/sunrpc/
H A Dgss_asn1.h70 int *body_size,
76 unsigned int body_size);
80 int body_size,
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sunrpc/auth_gss/
H A Dgss_generic_token.c143 g_token_size(struct xdr_netobj *mech, unsigned int body_size) argument
145 /* set body_size to sequence contents size */
146 body_size += 2 + (int) mech->len; /* NEED overflow check */
147 return(1 + der_length_size(body_size) + body_size);
156 g_make_token_header(struct xdr_netobj *mech, int body_size, unsigned char **buf) argument
159 der_write_length(buf, 2 + mech->len + body_size);
169 * leaving buf advanced past the token header, and setting body_size
173 * *body_size are left unmodified on error.
176 g_verify_token_header(struct xdr_netobj *mech, int *body_size, argument
[all...]
H A Dgss_krb5_seal.c77 int body_size = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; local
79 token->len = g_token_size(&ctx->mech_used, body_size);
82 g_make_token_header(&ctx->mech_used, body_size, (unsigned char **)&ptr);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/libevent-2.0.20-stable/include/event2/
H A Dhttp_struct.h95 size_t body_size; member in struct:evhttp_request
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libav-0.8.8/libavformat/
H A Diff.c76 uint32_t body_size; member in struct:__anon2160
152 iff->body_size = data_size;
274 if(iff->sent_bytes >= iff->body_size)
277 ret = av_get_packet(pb, pkt, iff->body_size);
283 iff->sent_bytes = iff->body_size;
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ecryptfs/
H A Dkeystore.c1125 size_t body_size; local
1167 rc = ecryptfs_parse_packet_length(&data[(*packet_size)], &body_size,
1174 if (unlikely(body_size < (ECRYPTFS_SIG_SIZE + 2))) {
1175 printk(KERN_WARNING "Invalid body size ([%td])\n", body_size);
1180 if (unlikely((*packet_size) + body_size > max_packet_size)) {
1198 body_size - (ECRYPTFS_SIG_SIZE + 2);
1207 &data[(*packet_size)], (body_size - (ECRYPTFS_SIG_SIZE + 2)));
1257 size_t body_size; local
1301 rc = ecryptfs_parse_packet_length(&data[(*packet_size)], &body_size,
1308 if (unlikely(body_size < (ECRYPTFS_SALT_SIZ
1430 size_t body_size; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/message/i2o/
H A Dmemory.c26 * @body_size: maximum body size used for message in 32-bit words.
30 u16 i2o_sg_tablesize(struct i2o_controller *c, u16 body_size) argument
35 body_size;
H A Di2o_scsi.c105 u16 body_size = 6; local
109 body_size = 8;
137 scsi_host->sg_tablesize = i2o_sg_tablesize(c, body_size);
H A Di2o_block.c1040 u16 body_size = 4; local
1046 body_size = 8;
1087 blk_queue_max_segments(queue, i2o_sg_tablesize(c, body_size));
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/libavformat/
H A Diff.c104 uint32_t body_size; member in struct:__anon3507
418 iff->body_size = data_size;
712 ret = av_get_packet(pb, pkt, iff->body_size);
717 if (av_new_packet(pkt, iff->body_size + 2) < 0) {
723 ret = avio_read(pb, buf, iff->body_size);
726 } else if (ret < iff->body_size)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/libevent-2.0.20-stable/
H A Dhttp.c884 /* ntoread is signed int64, body_size is unsigned size_t, check for under/overflow conditions */
885 if ((ev_uint64_t)ntoread > EV_SIZE_MAX - req->body_size) {
889 if (req->body_size + (size_t)ntoread > req->evcon->max_body_size) {
895 req->body_size += (size_t)ntoread;
982 if ((size_t)(req->body_size + evbuffer_get_length(buf)) < req->body_size) {
987 req->body_size += evbuffer_get_length(buf);
998 req->body_size += n;
1002 if (req->body_size > req->evcon->max_body_size ||
3462 req->body_size
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/
H A Di2o.h693 extern u16 i2o_sg_tablesize(struct i2o_controller *c, u16 body_size);

Completed in 83 milliseconds