Lines Matching refs:ntohs
173 mru = ntohs(mru); in parsePADOTags()
223 mru = ntohs(mru); in parsePADSTags()
394 if (ntohs(packet.length) + HDR_SIZE > len) { in waitForPADO()
396 (unsigned int) ntohs(packet.length)); in waitForPADO()
509 ntohs(conn->cookie.length) + TAG_HDR_SIZE); in sendPADR()
510 memcpy(cursor, &conn->cookie, ntohs(conn->cookie.length) + TAG_HDR_SIZE); in sendPADR()
511 cursor += ntohs(conn->cookie.length) + TAG_HDR_SIZE; in sendPADR()
512 plen += ntohs(conn->cookie.length) + TAG_HDR_SIZE; in sendPADR()
517 ntohs(conn->relayId.length) + TAG_HDR_SIZE); in sendPADR()
518 memcpy(cursor, &conn->relayId, ntohs(conn->relayId.length) + TAG_HDR_SIZE); in sendPADR()
519 cursor += ntohs(conn->relayId.length) + TAG_HDR_SIZE; in sendPADR()
520 plen += ntohs(conn->relayId.length) + TAG_HDR_SIZE; in sendPADR()
579 if (ntohs(packet.length) + HDR_SIZE > len) { in waitForPADS()
581 (unsigned int) ntohs(packet.length)); in waitForPADS()
611 info("PPP session is %d", (int) ntohs(conn->session)); in waitForPADS()
614 if (ntohs(conn->session) == 0 || ntohs(conn->session) == 0xFFFF) { in waitForPADS()
615 … used a session value of %x -- the AC is violating RFC 2516", (unsigned int) ntohs(conn->session)); in waitForPADS()