Searched refs:nkeys (Results 1 – 8 of 8) sorted by relevance
/external/iproute2/tc/ |
D | f_flow.c | 62 static int flow_parse_keys(__u32 *keys, __u32 *nkeys, char *argv) in flow_parse_keys() argument 68 *nkeys = 0; in flow_parse_keys() 78 (*nkeys)++; in flow_parse_keys() 139 __u32 keys = 0, nkeys = 0; in flow_parse_opt() local 162 if (flow_parse_keys(&keys, &nkeys, *argv)) in flow_parse_opt() 253 if (nkeys > 1 && mode != FLOW_MODE_HASH) { in flow_parse_opt()
|
D | m_pedit.c | 124 int hwm = sel->nkeys; in pack_key() 140 sel->nkeys++; in pack_key() 543 …addattr_l(n, MAX_MSG, TCA_PEDIT_PARMS,&sel, sizeof(sel.sel)+sel.sel.nkeys*sizeof(struct tc_pedit_k… in parse_pedit() 569 fprintf(f, " pedit action %s keys %d\n ", action_n2a(sel->action, b1, sizeof (b1)),sel->nkeys); in print_pedit() 578 if (sel->nkeys) { in print_pedit() 582 for (i=0; i<sel->nkeys; i++, key++) { in print_pedit() 590 fprintf(f, "\npedit %x keys %d is not LEGIT", sel->index,sel->nkeys); in print_pedit()
|
D | f_u32.c | 123 int hwm = sel->nkeys; in pack_key() 147 sel->nkeys++; in pack_key() 1059 if (sel2.sel.nkeys != 1) { in u32_parse_opt() 1135 sizeof(sel.sel)+sel.sel.nkeys*sizeof(struct tc_u32_key)); in u32_parse_opt() 1214 if (sel->nkeys) { in u32_print_opt() 1216 for (i=0; i<sel->nkeys; i++) { in u32_print_opt()
|
/external/iproute2/include/linux/tc_act/ |
D | tc_pedit.h | 31 unsigned char nkeys; member
|
/external/iproute2/include/linux/ |
D | pkt_cls.h | 215 unsigned char nkeys; member
|
/external/kernel-headers/original/linux/ |
D | pkt_cls.h | 215 unsigned char nkeys; member
|
/external/bluetooth/glib/glib/ |
D | gutils.h | 205 guint nkeys);
|
D | gutils.c | 639 guint nkeys) in g_parse_debug_string() argument 654 for (i=0; i<nkeys; i++) in g_parse_debug_string() 661 for (i=0; i<nkeys; i++) in g_parse_debug_string() 676 for (i = 0; i < nkeys; i++) in g_parse_debug_string()
|