Home
last modified time | relevance | path

Searched refs:req_size (Results 1 – 5 of 5) sorted by relevance

/net/tipc/
Dnetlink_compat.c58 int req_size; member
261 if (msg->req_type && (!msg->req_size || in tipc_nl_compat_dumpit()
359 if (msg->req_type && (!msg->req_size || in tipc_nl_compat_doit()
1284 msg.req_size = nlmsg_attrlen(req_nlh, GENL_HDRLEN + TIPC_GENL_HDRLEN); in tipc_nl_compat_recv()
1285 if (msg.req_size && !TLV_OK(msg.req, msg.req_size)) { in tipc_nl_compat_recv()
/net/tls/
Dtls_device_fallback.c130 unsigned int req_size = sizeof(struct aead_request) + in tls_alloc_aead_request() local
134 aead_req = kzalloc(req_size, flags); in tls_alloc_aead_request()
/net/openvswitch/
Dflow_netlink.c2322 size_t req_size = NLA_ALIGN(attr_len); in reserve_sfa_size() local
2326 if (req_size <= (ksize(*sfa) - next_offset)) in reserve_sfa_size()
2329 new_acts_size = max(next_offset + req_size, ksize(*sfa) * 2); in reserve_sfa_size()
2332 if ((MAX_ACTIONS_BUFSIZE - next_offset) < req_size) { in reserve_sfa_size()
2351 (*sfa)->actions_len += req_size; in reserve_sfa_size()
/net/key/
Daf_key.c2149 int req_size; in pfkey_xfrm_policy2msg() local
2152 req_size = sizeof(struct sadb_x_ipsecrequest); in pfkey_xfrm_policy2msg()
2155 req_size += socklen * 2; in pfkey_xfrm_policy2msg()
2159 rq = skb_put(skb, req_size); in pfkey_xfrm_policy2msg()
2160 pol->sadb_x_policy_len += req_size/8; in pfkey_xfrm_policy2msg()
2162 rq->sadb_x_ipsecrequest_len = req_size; in pfkey_xfrm_policy2msg()
/net/9p/
Dclient.c683 int8_t type, int req_size, in p9_client_prepare_req() argument
699 req = p9_tag_alloc(c, type, req_size); in p9_client_prepare_req()