Lines Matching refs:ntohs
348 if (ntohs(packet.length) + HDR_SIZE > len) { in waitForPADO()
350 (unsigned int) ntohs(packet.length)); in waitForPADO()
461 ntohs(conn->cookie.length) + TAG_HDR_SIZE); in sendPADR()
462 memcpy(cursor, &conn->cookie, ntohs(conn->cookie.length) + TAG_HDR_SIZE); in sendPADR()
463 cursor += ntohs(conn->cookie.length) + TAG_HDR_SIZE; in sendPADR()
464 plen += ntohs(conn->cookie.length) + TAG_HDR_SIZE; in sendPADR()
469 ntohs(conn->relayId.length) + TAG_HDR_SIZE); in sendPADR()
470 memcpy(cursor, &conn->relayId, ntohs(conn->relayId.length) + TAG_HDR_SIZE); in sendPADR()
471 cursor += ntohs(conn->relayId.length) + TAG_HDR_SIZE; in sendPADR()
472 plen += ntohs(conn->relayId.length) + TAG_HDR_SIZE; in sendPADR()
525 if (ntohs(packet.length) + HDR_SIZE > len) { in waitForPADS()
527 (unsigned int) ntohs(packet.length)); in waitForPADS()
559 syslog(LOG_INFO, "PPP session is %d", (int) ntohs(conn->session)); in waitForPADS()
562 if (ntohs(conn->session) == 0 || ntohs(conn->session) == 0xFFFF) { in waitForPADS()
563 … used a session value of %x -- the AC is violating RFC 2516", (unsigned int) ntohs(conn->session)); in waitForPADS()