/linux-master/security/integrity/ima/ |
H A D | ima_asymmetric_keys.c | 22 * @payload_len: The length of @payload. 30 const void *payload, size_t payload_len, 39 if (!payload || (payload_len == 0)) 43 queued = ima_queue_key(keyring, payload, payload_len); 63 process_buffer_measurement(&nop_mnt_idmap, NULL, payload, payload_len, 29 ima_post_key_create_or_update(struct key *keyring, struct key *key, const void *payload, size_t payload_len, unsigned long flags, bool create) argument
|
H A D | ima_queue_keys.c | 69 size_t payload_len) 77 entry->payload = kmemdup(payload, payload_len, GFP_KERNEL); 80 entry->payload_len = payload_len; 105 size_t payload_len) 110 entry = ima_alloc_key_entry(keyring, payload, payload_len); 164 entry->payload_len, 67 ima_alloc_key_entry(struct key *keyring, const void *payload, size_t payload_len) argument 104 ima_queue_key(struct key *keyring, const void *payload, size_t payload_len) argument
|
/linux-master/drivers/scsi/libfc/ |
H A D | fc_frame.c | 62 struct fc_frame *fc_frame_alloc_fill(struct fc_lport *lp, size_t payload_len) argument 67 fill = payload_len % 4; 70 fp = _fc_frame_alloc(payload_len + fill); 72 memset((char *) fr_hdr(fp) + payload_len, 0, fill); 75 payload_len + sizeof(struct fc_frame_header));
|
/linux-master/net/mac80211/ |
H A D | tkip.h | 16 u8 *payload, size_t payload_len); 26 u8 *payload, size_t payload_len, u8 *ta,
|
/linux-master/drivers/net/wireless/ath/ath10k/ |
H A D | swap.c | 24 u32 payload_len; local 35 payload_len = __le32_to_cpu(swap_item->tlv.length); 36 if ((payload_len > size_left) || 37 (payload_len == 0 && 40 payload_len); 44 if (payload_len == 0) { 55 memcpy(virt_addr, swap_item->tlv.data, payload_len); 56 virt_addr += payload_len; 57 length = payload_len + sizeof(struct ath10k_swap_code_seg_tlv); 60 total_payload_len += payload_len; [all...] |
/linux-master/tools/testing/selftests/net/ |
H A D | ip_defrag.c | 36 static int payload_len; variable 59 ret = recv(fd_udp, recv_buff, payload_len, 0); 74 error(1, errno, "recv: payload_len = %d max_frag_len = %d", 75 payload_len, max_frag_len); 76 if (ret != payload_len) 77 error(1, 0, "recv: wrong size: %d vs %d", (int)ret, payload_len); 78 if (memcmp(udp_payload, recv_buff, payload_len)) 107 IPPROTO_UDP + (uint32_t)(UDP_HLEN + payload_len)); 109 sum = raw_checksum((uint8_t *)udp_payload, payload_len, sum); 126 sum = raw_checksum((uint8_t *)udp_payload, payload_len, su [all...] |
H A D | tap.c | 264 static int build_ipv4_header(uint8_t *buf, int payload_len) argument 272 htons(sizeof(*iph) + sizeof(struct udphdr) + payload_len); 282 static int build_udp_packet(uint8_t *buf, int payload_len, bool csum_off) argument 286 int len = sizeof(*udph) + payload_len; 293 memset(buf + sizeof(struct udphdr), PKT_DATA, payload_len); 303 return sizeof(*udph) + payload_len; 306 size_t build_test_packet_valid_udp_gso(uint8_t *buf, size_t payload_len) argument 320 cur += build_ipv4_header(cur, payload_len); 321 cur += build_udp_packet(cur, payload_len, true); 326 size_t build_test_packet_valid_udp_csum(uint8_t *buf, size_t payload_len) argument 342 build_test_packet_crash_tap_invalid_eth_proto(uint8_t *buf, size_t payload_len) argument [all...] |
H A D | psock_snd.c | 117 static int build_ipv4_header(void *header, int payload_len) argument 124 iph->tot_len = htons(sizeof(*iph) + sizeof(struct udphdr) + payload_len); 134 static int build_udp_header(void *header, int payload_len) argument 138 int len = sizeof(*udph) + payload_len; 153 static int build_packet(int payload_len) argument 159 off += build_ipv4_header(tbuf + off, payload_len); 160 off += build_udp_header(tbuf + off, payload_len); 162 if (off + payload_len > sizeof(tbuf)) 165 memset(tbuf + off, DATA_CHAR, payload_len); 167 return off + payload_len; [all...] |
H A D | gro.c | 187 static uint16_t tcp_checksum(void *buf, int payload_len) argument 193 uint16_t payload_len; member in struct:pseudo_header6 199 uint16_t payload_len; member in struct:pseudo_header4 209 ph6.payload_len = htons(sizeof(struct tcphdr) + payload_len); 218 ph4.payload_len = htons(sizeof(struct tcphdr) + payload_len); 223 return checksum_fold(buf, sizeof(struct tcphdr) + payload_len, sum); 243 static void fill_networklayer(void *buf, int payload_len) argument 252 ip6h->payload_len 277 fill_transportlayer(void *buf, int seq_offset, int ack_offset, int payload_len, int fin) argument 307 create_packet(void *buf, int seq_offset, int ack_offset, int payload_len, int fin) argument 324 int payload_len, pkt_size, flag, i; local [all...] |
/linux-master/include/net/ |
H A D | pptp.h | 20 __be16 payload_len; member in struct:pptp_gre_header
|
/linux-master/drivers/hid/intel-ish-hid/ |
H A D | ishtp-hid-client.c | 33 * @payload_len: Length of payload expected 38 size_t cur_pos, size_t payload_len) 46 "payload_len=%u\n" 53 (unsigned int)payload_len, client_data->multi_packet_cnt, 73 size_t payload_len, total_len, cur_pos, raw_len; local 99 payload_len = recv_msg->hdr.size; 102 if (cur_pos + payload_len + sizeof(struct hostif_msg) > 106 payload_len); 121 payload_len); 140 payload_len) { 37 report_bad_packet(struct ishtp_cl *hid_ishtp_cl, void *recv_buf, size_t cur_pos, size_t payload_len) argument [all...] |
/linux-master/drivers/scsi/libsas/ |
H A D | sas_host_smp.c | 233 if (job->request_payload.payload_len < 8 || 234 job->reply_payload.payload_len < 8) 238 req_data = kzalloc(job->request_payload.payload_len, GFP_KERNEL); 243 job->request_payload.payload_len); 247 resp_data = kzalloc(max(job->reply_payload.payload_len, 128U), 282 if (job->request_payload.payload_len < 16) 294 if (job->request_payload.payload_len < 16) 309 if (job->request_payload.payload_len < 326 if (job->request_payload.payload_len < 44) 345 job->reply_payload.payload_len); [all...] |
/linux-master/samples/bpf/ |
H A D | xdp_tx_iptunnel_kern.c | 86 u16 payload_len; local 103 payload_len = ntohs(iph->tot_len); 135 iph->tot_len = htons(payload_len + sizeof(*iph)); 160 __u16 payload_len; local 175 payload_len = ip6h->payload_len; 204 ip6h->payload_len = htons(ntohs(payload_len) + sizeof(*ip6h));
|
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | test_xdp.c | 88 __u16 payload_len; local 105 payload_len = bpf_ntohs(iph->tot_len); 135 iph->tot_len = bpf_htons(payload_len + sizeof(*iph)); 160 __u16 payload_len; local 175 payload_len = ip6h->payload_len; 201 ip6h->payload_len = bpf_htons(bpf_ntohs(payload_len) + sizeof(*ip6h));
|
H A D | test_xdp_loop.c | 84 __u16 payload_len; local 101 payload_len = bpf_ntohs(iph->tot_len); 131 iph->tot_len = bpf_htons(payload_len + sizeof(*iph)); 156 __u16 payload_len; local 171 payload_len = ip6h->payload_len; 197 ip6h->payload_len = bpf_htons(bpf_ntohs(payload_len) + sizeof(*ip6h));
|
H A D | test_xdp_dynptr.c | 88 __u16 payload_len; local 114 payload_len = bpf_ntohs(iph->tot_len); 143 iph->tot_len = bpf_htons(payload_len + iphdr_sz); 169 __u16 payload_len; local 193 payload_len = ip6h->payload_len; 219 ip6h->payload_len = bpf_htons(bpf_ntohs(payload_len) + ipv6hdr_sz);
|
H A D | fexit_bpf2bpf.c | 129 if (ip6p->nexthdr != 6 || ip6p->payload_len != __bpf_constant_htons(123)) 136 if (ip6p->nexthdr != 6 || ip6p->payload_len != __bpf_constant_htons(123))
|
/linux-master/net/ipv6/ |
H A D | ip6_offload.c | 115 unsigned int payload_len; local 165 payload_len = skb_shinfo(skb)->gso_size + 169 payload_len = skb->len - nhoff - sizeof(*ipv6h); 170 ipv6h->payload_len = htons(payload_len); 184 offset += (ntohs(ipv6h->payload_len) - 241 flush += ntohs(iph->payload_len) != skb->len - hlen; 354 u32 payload_len; local 361 payload_len = skb->len - nhoff - sizeof(*iph); 362 if (unlikely(payload_len > IPV6_MAXPLE [all...] |
/linux-master/include/linux/ |
H A D | bsg-lib.h | 24 unsigned int payload_len; member in struct:bsg_buffer
|
/linux-master/net/tls/ |
H A D | tls_device_fallback.c | 242 int payload_len = skb->len - tcp_payload_offset; local 292 if (skb_to_sgvec(skb, &sg_in[i], tcp_payload_offset, payload_len) < 0) 302 int payload_len, 310 sg_set_buf(&sg_out[1], nskb->data + tcp_payload_offset, payload_len); 324 int payload_len = skb->len - tcp_payload_offset; local 357 payload_len, sync_size, dummy_buf); 360 rcd_sn, sync_size + payload_len, 387 int payload_len = skb->len - tcp_payload_offset; local 401 if (!payload_len) 413 if (sync_size < 0 && payload_len < 298 fill_sg_out(struct scatterlist sg_out[3], void *buf, struct tls_context *tls_ctx, struct sk_buff *nskb, int tcp_payload_offset, int payload_len, int sync_size, void *dummy_buf) argument [all...] |
/linux-master/net/ipv6/netfilter/ |
H A D | nf_conntrack_reasm.c | 169 unsigned int payload_len; local 180 payload_len = ntohs(ipv6_hdr(skb)->payload_len); 183 end = offset + (payload_len - 270 if (payload_len > fq->q.max_size) 271 fq->q.max_size = payload_len; 318 int payload_len; local 331 payload_len = -skb_network_offset(skb) - 334 if (payload_len > IPV6_MAXPLEN) { 336 payload_len); [all...] |
/linux-master/net/core/ |
H A D | drop_monitor.c | 557 static size_t net_dm_packet_report_size(size_t payload_len) argument 581 nla_total_size(payload_len); 610 size_t payload_len) 666 if (!payload_len) 672 attr = skb_put(msg, nla_total_size(payload_len)); 674 attr->nla_len = nla_attr_size(payload_len); 675 if (skb_copy_bits(skb, 0, nla_data(attr), payload_len)) 693 size_t payload_len; local 703 payload_len = min_t(size_t, skb->len, NET_DM_MAX_PACKET_SIZE); 705 payload_len 609 net_dm_packet_report_fill(struct sk_buff *msg, struct sk_buff *skb, size_t payload_len) argument 750 net_dm_hw_packet_report_size(size_t payload_len, const struct devlink_trap_metadata *hw_metadata) argument 778 net_dm_hw_packet_report_fill(struct sk_buff *msg, struct sk_buff *skb, size_t payload_len) argument 910 size_t payload_len; local [all...] |
/linux-master/drivers/net/wireless/ralink/rt2x00/ |
H A D | rt2x00crypto.c | 148 unsigned int payload_len = rxdesc->size - header_length; local 220 payload_len); 228 transfer += payload_len;
|
/linux-master/net/nfc/hci/ |
H A D | hcp.c | 23 const u8 *payload, size_t payload_len, 44 hci_len = payload_len + 1; 21 nfc_hci_hcp_message_tx(struct nfc_hci_dev *hdev, u8 pipe, u8 type, u8 instruction, const u8 *payload, size_t payload_len, data_exchange_cb_t cb, void *cb_context, unsigned long completion_delay) argument
|
/linux-master/include/net/netfilter/ |
H A D | nf_tables_ipv6.h | 45 pkt_len = ntohs(ip6h->payload_len); 88 pkt_len = ntohs(ip6h->payload_len);
|