Home
last modified time | relevance | path

Searched refs:nkeys (Results 1 – 8 of 8) sorted by relevance

/external/iproute2/tc/
Df_flow.c62 static int flow_parse_keys(__u32 *keys, __u32 *nkeys, char *argv) in flow_parse_keys() argument
68 *nkeys = 0; in flow_parse_keys()
78 (*nkeys)++; in flow_parse_keys()
139 __u32 keys = 0, nkeys = 0; in flow_parse_opt() local
162 if (flow_parse_keys(&keys, &nkeys, *argv)) in flow_parse_opt()
253 if (nkeys > 1 && mode != FLOW_MODE_HASH) { in flow_parse_opt()
Dm_pedit.c124 int hwm = sel->nkeys; in pack_key()
140 sel->nkeys++; in pack_key()
543 …addattr_l(n, MAX_MSG, TCA_PEDIT_PARMS,&sel, sizeof(sel.sel)+sel.sel.nkeys*sizeof(struct tc_pedit_k… in parse_pedit()
569 fprintf(f, " pedit action %s keys %d\n ", action_n2a(sel->action, b1, sizeof (b1)),sel->nkeys); in print_pedit()
578 if (sel->nkeys) { in print_pedit()
582 for (i=0; i<sel->nkeys; i++, key++) { in print_pedit()
590 fprintf(f, "\npedit %x keys %d is not LEGIT", sel->index,sel->nkeys); in print_pedit()
Df_u32.c123 int hwm = sel->nkeys; in pack_key()
147 sel->nkeys++; in pack_key()
1059 if (sel2.sel.nkeys != 1) { in u32_parse_opt()
1135 sizeof(sel.sel)+sel.sel.nkeys*sizeof(struct tc_u32_key)); in u32_parse_opt()
1214 if (sel->nkeys) { in u32_print_opt()
1216 for (i=0; i<sel->nkeys; i++) { in u32_print_opt()
/external/iproute2/include/linux/tc_act/
Dtc_pedit.h31 unsigned char nkeys; member
/external/iproute2/include/linux/
Dpkt_cls.h215 unsigned char nkeys; member
/external/kernel-headers/original/linux/
Dpkt_cls.h215 unsigned char nkeys; member
/external/bluetooth/glib/glib/
Dgutils.h205 guint nkeys);
Dgutils.c639 guint nkeys) in g_parse_debug_string() argument
654 for (i=0; i<nkeys; i++) in g_parse_debug_string()
661 for (i=0; i<nkeys; i++) in g_parse_debug_string()
676 for (i = 0; i < nkeys; i++) in g_parse_debug_string()