/net/netfilter/ |
D | nf_conntrack_sip.c | 238 const char *dptr, unsigned int datalen, in ct_sip_parse_request() argument 242 const char *start = dptr, *limit = dptr + datalen, *end; in ct_sip_parse_request() 368 unsigned int dataoff, unsigned int datalen, in ct_sip_get_header() argument 373 const char *start = dptr, *limit = dptr + datalen; in ct_sip_get_header() 436 unsigned int dataoff, unsigned int datalen, in ct_sip_next_header() argument 441 const char *start = dptr, *limit = dptr + datalen; in ct_sip_next_header() 466 unsigned int dataoff, unsigned int datalen, in ct_sip_walk_headers() argument 474 ret = ct_sip_next_header(ct, dptr, dataoff, datalen, in ct_sip_walk_headers() 486 ret = ct_sip_get_header(ct, dptr, dataoff, datalen, in ct_sip_walk_headers() 506 unsigned int *dataoff, unsigned int datalen, in ct_sip_parse_header_uri() argument [all …]
|
D | nf_nat_sip.c | 36 const char **dptr, unsigned int *datalen, in mangle_packet() argument 66 *datalen += buflen - matchlen; in mangle_packet() 94 const char **dptr, unsigned int *datalen, in map_addr() argument 123 return mangle_packet(skb, protoff, dataoff, dptr, datalen, in map_addr() 129 const char **dptr, unsigned int *datalen, in map_sip_addr() argument 138 if (ct_sip_parse_header_uri(ct, *dptr, NULL, *datalen, type, NULL, in map_sip_addr() 141 return map_addr(skb, protoff, dataoff, dptr, datalen, in map_sip_addr() 147 const char **dptr, unsigned int *datalen) in nf_nat_sip() argument 161 if (ct_sip_parse_request(ct, *dptr, *datalen, in nf_nat_sip() 164 !map_addr(skb, protoff, dataoff, dptr, datalen, in nf_nat_sip() [all …]
|
D | nf_nat_helper.c | 96 int oldlen, datalen; in __nf_nat_mangle_tcp_packet() local 112 datalen = skb->len - protoff; in __nf_nat_mangle_tcp_packet() 115 tcph, &tcph->check, datalen, oldlen); in __nf_nat_mangle_tcp_packet() 146 int datalen, oldlen; in nf_nat_mangle_udp_packet() local 163 datalen = skb->len - protoff; in nf_nat_mangle_udp_packet() 164 udph->len = htons(datalen); in nf_nat_mangle_udp_packet() 171 udph, &udph->check, datalen, oldlen); in nf_nat_mangle_udp_packet()
|
D | nf_conntrack_sane.c | 67 unsigned int dataoff, datalen; in help() local 94 datalen = skb->len - dataoff; in help() 97 sb_ptr = skb_header_pointer(skb, dataoff, datalen, sane_buffer); in help() 104 if (datalen != sizeof(struct sane_request)) in help() 126 if (datalen < sizeof(struct sane_reply_net_start)) { in help()
|
D | nf_conntrack_h323_main.c | 120 unsigned char **data, int *datalen, int *dataoff) in get_tpkt_data() argument 163 *datalen = info->tpkt_len[dir]; in get_tpkt_data() 178 tpktoff = *dataoff + *datalen; in get_tpkt_data() 182 tpkt = *data + *datalen; in get_tpkt_data() 209 *datalen = tpktlen - 4; in get_tpkt_data() 579 int datalen; in h245_help() local 593 &data, &datalen, &dataoff)) { in h245_help() 594 pr_debug("nf_ct_h245: TPKT len=%d ", datalen); in h245_help() 598 ret = DecodeMultimediaSystemControlMessage(data, datalen, in h245_help() 1139 int datalen; in q931_help() local [all …]
|
D | nf_conntrack_ftp.c | 378 unsigned int dataoff, datalen; in help() local 412 datalen = skb->len - dataoff; in help() 415 fb_ptr = skb_header_pointer(skb, dataoff, datalen, ftp_buffer); in help() 421 ends_in_nl = (fb_ptr[datalen - 1] == '\n'); in help() 422 seq = ntohl(th->seq) + datalen; in help() 450 found = find_pattern(fb_ptr, datalen, in help()
|
D | nf_nat_proto.c | 501 int datalen, int oldlen) in nf_nat_ipv4_csum_recalc() argument 510 *check = ~csum_tcpudp_magic(iph->saddr, iph->daddr, datalen, in nf_nat_ipv4_csum_recalc() 514 htons(oldlen), htons(datalen), true); in nf_nat_ipv4_csum_recalc() 521 int datalen, int oldlen) in nf_nat_ipv6_csum_recalc() argument 531 datalen, proto, 0); in nf_nat_ipv6_csum_recalc() 534 htons(oldlen), htons(datalen), true); in nf_nat_ipv6_csum_recalc() 541 int datalen, int oldlen) in nf_nat_csum_recalc() argument 546 datalen, oldlen); in nf_nat_csum_recalc() 551 datalen, oldlen); in nf_nat_csum_recalc()
|
D | nf_conntrack_pptp.c | 528 unsigned int datalen, reqlen, nexthdr_off; in conntrack_pptp_help() local 551 datalen = tcplen - tcph->doff * 4; in conntrack_pptp_help() 559 datalen -= sizeof(_pptph); in conntrack_pptp_help() 572 datalen -= sizeof(_ctlh); in conntrack_pptp_help() 574 reqlen = datalen; in conntrack_pptp_help()
|
/net/dns_resolver/ |
D | dns_key.c | 97 int datalen = prep->datalen, result_len = 0; in dns_resolver_preparse() local 100 if (datalen <= 1 || !data) in dns_resolver_preparse() 107 if (datalen < sizeof(*v1)) in dns_resolver_preparse() 111 kenter("[%u,%u],%u", v1->hdr.content, v1->hdr.version, datalen); in dns_resolver_preparse() 132 result_len = datalen; in dns_resolver_preparse() 136 kenter("'%*.*s',%u", datalen, datalen, data, datalen); in dns_resolver_preparse() 138 if (!data || data[datalen - 1] != '\0') in dns_resolver_preparse() 140 datalen--; in dns_resolver_preparse() 143 end = data + datalen; in dns_resolver_preparse() 144 opt = memchr(data, '#', datalen); in dns_resolver_preparse() [all …]
|
/net/rxrpc/ |
D | key.c | 53 size_t datalen, in rxrpc_preparse_xdr_rxkad() argument 75 prep->quotalen = datalen + plen; in rxrpc_preparse_xdr_rxkad() 141 size_t datalen = prep->datalen; in rxrpc_preparse_xdr() local 146 prep->datalen); in rxrpc_preparse_xdr() 148 if (datalen > AFSTOKEN_LENGTH_MAX) in rxrpc_preparse_xdr() 152 if (datalen & 3) in rxrpc_preparse_xdr() 159 datalen -= 4; in rxrpc_preparse_xdr() 165 datalen -= 4; in rxrpc_preparse_xdr() 167 if (paddedlen > datalen) in rxrpc_preparse_xdr() 179 datalen -= paddedlen; in rxrpc_preparse_xdr() [all …]
|
/net/netfilter/ipvs/ |
D | ip_vs_pe_sip.c | 31 unsigned int datalen, in get_callid() argument 36 int ret = ct_sip_get_header(NULL, dptr, dataoff, datalen, in get_callid() 51 if (*matchoff + *matchlen == datalen) in get_callid() 70 unsigned int dataoff, datalen, matchoff, matchlen; in ip_vs_sip_fill_param() local 90 datalen = skb->len - dataoff; in ip_vs_sip_fill_param() 92 if (get_callid(dptr, 0, datalen, &matchoff, &matchlen)) in ip_vs_sip_fill_param()
|
/net/mac802154/ |
D | llsec.c | 618 int err, datalen; in llsec_do_encrypt_unauth() local 624 datalen = skb_tail_pointer(skb) - data; in llsec_do_encrypt_unauth() 625 sg_init_one(&src, data, datalen); in llsec_do_encrypt_unauth() 629 skcipher_request_set_crypt(req, &src, &src, datalen, iv); in llsec_do_encrypt_unauth() 654 int authlen, assoclen, datalen, rc; in llsec_do_encrypt_auth() local 668 datalen = skb_tail_pointer(skb) - data; in llsec_do_encrypt_auth() 672 sg_init_one(&sg, skb_mac_header(skb), assoclen + datalen + authlen); in llsec_do_encrypt_auth() 675 assoclen += datalen; in llsec_do_encrypt_auth() 676 datalen = 0; in llsec_do_encrypt_auth() 680 aead_request_set_crypt(req, &sg, &sg, datalen, iv); in llsec_do_encrypt_auth() [all …]
|
/net/ipv4/netfilter/ |
D | nf_nat_snmp_basic_main.c | 96 const void *data, size_t datalen) in snmp_version() argument 98 if (datalen != 1) in snmp_version() 106 const void *data, size_t datalen) in snmp_helper() argument 111 if (datalen != 4) in snmp_helper() 130 u16 datalen = ntohs(udph->len) - sizeof(struct udphdr); in snmp_translate() local 148 ret = asn1_ber_decoder(&nf_nat_snmp_basic_decoder, &ctx, data, datalen); in snmp_translate()
|
/net/wireless/ |
D | scan.c | 224 if (!non_inherit_elem || non_inherit_elem->datalen < 2) in cfg80211_is_element_inherited() 235 if (non_inherit_elem->datalen < 3 + id_len) in cfg80211_is_element_inherited() 239 if (non_inherit_elem->datalen < 3 + id_len + ext_id_len) in cfg80211_is_element_inherited() 270 elem->data + elem->datalen > ie + ie_len)) in cfg80211_copy_elem_with_frags() 273 if (elem->datalen + 2 > buf + buf_len - *pos) in cfg80211_copy_elem_with_frags() 276 memcpy(*pos, elem, elem->datalen + 2); in cfg80211_copy_elem_with_frags() 277 *pos += elem->datalen + 2; in cfg80211_copy_elem_with_frags() 280 if (elem->datalen != 255) in cfg80211_copy_elem_with_frags() 283 ie_len = ie + ie_len - elem->data - elem->datalen; in cfg80211_copy_elem_with_frags() 284 ie = (const u8 *)elem->data + elem->datalen; in cfg80211_copy_elem_with_frags() [all …]
|
/net/ceph/ |
D | crypto.c | 301 size_t datalen = prep->datalen; in ceph_key_preparse() local 306 if (datalen <= 0 || datalen > 32767 || !prep->data) in ceph_key_preparse() 316 ret = ceph_crypto_key_decode(ckey, &p, (char*)prep->data+datalen); in ceph_key_preparse() 321 prep->quotalen = datalen; in ceph_key_preparse()
|
/net/sched/ |
D | ematch.c | 237 if (em->ops->datalen && data_len < em->ops->datalen) in tcf_em_validate() 258 if (em->ops->datalen > 0) in tcf_em_validate() 271 em->datalen = data_len; in tcf_em_validate() 474 } else if (em->datalen > 0) in tcf_em_tree_dump() 475 nla_put_nohdr(skb, em->datalen, (void *) em->data); in tcf_em_tree_dump()
|
D | em_nbyte.c | 31 em->datalen = sizeof(*nbyte) + nbyte->len; in em_nbyte_change() 32 em->data = (unsigned long)kmemdup(data, em->datalen, GFP_KERNEL); in em_nbyte_change()
|
D | em_ipset.c | 32 em->datalen = sizeof(*set); in em_ipset_change() 33 em->data = (unsigned long)kmemdup(data, em->datalen, GFP_KERNEL); in em_ipset_change()
|
D | em_u32.c | 39 .datalen = sizeof(struct tc_u32_key),
|
D | em_cmp.c | 74 .datalen = sizeof(struct tcf_em_cmp),
|
/net/core/ |
D | pktgen.c | 2754 int datalen) in pktgen_finalize_skb() argument 2760 datalen -= sizeof(*pgh); in pktgen_finalize_skb() 2763 skb_put_zero(skb, datalen); in pktgen_finalize_skb() 2772 len = datalen - frags * PAGE_SIZE; in pktgen_finalize_skb() 2775 datalen = frags * PAGE_SIZE; in pktgen_finalize_skb() 2779 frag_len = (datalen/frags) < PAGE_SIZE ? in pktgen_finalize_skb() 2780 (datalen/frags) : PAGE_SIZE; in pktgen_finalize_skb() 2781 while (datalen > 0) { in pktgen_finalize_skb() 2797 (datalen < PAGE_SIZE ? datalen : PAGE_SIZE)); in pktgen_finalize_skb() 2800 datalen -= skb_frag_size(&skb_shinfo(skb)->frags[i]); in pktgen_finalize_skb() [all …]
|
/net/sctp/ |
D | ulpevent.c | 682 size_t padding, datalen; in sctp_ulpevent_make_rcvmsg() local 695 datalen = ntohs(chunk->chunk_hdr->length); in sctp_ulpevent_make_rcvmsg() 697 if (rx_count >= sk->sk_rcvbuf || !sk_rmem_schedule(sk, skb, datalen)) in sctp_ulpevent_make_rcvmsg() 725 padding = SCTP_PAD4(datalen) - datalen; in sctp_ulpevent_make_rcvmsg()
|
/net/tls/ |
D | tls_device_fallback.c | 170 int datalen = skb->len - headln; in update_chksum() local 187 datalen, IPPROTO_TCP, 0); in update_chksum() 190 th->check = ~csum_tcpudp_magic(iph->saddr, iph->daddr, datalen, in update_chksum()
|
/net/ipv6/ |
D | ip6_output.c | 1587 unsigned int datalen; in __ip6_append_data() local 1610 datalen = length + fraggap; in __ip6_append_data() 1612 …if (datalen > (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - fraghe… in __ip6_append_data() 1613 datalen = maxfraglen - fragheaderlen - rt->dst.trailer_len; in __ip6_append_data() 1614 fraglen = datalen + fragheaderlen; in __ip6_append_data() 1640 if (datalen != length + fraggap) { in __ip6_append_data() 1645 datalen += rt->dst.trailer_len; in __ip6_append_data() 1648 fraglen = datalen + fragheaderlen; in __ip6_append_data() 1650 copy = datalen - transhdrlen - fraggap - pagedlen; in __ip6_append_data()
|
/net/ipv4/ |
D | ip_output.c | 1053 unsigned int datalen; in __ip_append_data() local 1070 datalen = length + fraggap; in __ip_append_data() 1071 if (datalen > mtu - fragheaderlen) in __ip_append_data() 1072 datalen = maxfraglen - fragheaderlen; in __ip_append_data() 1073 fraglen = datalen + fragheaderlen; in __ip_append_data() 1084 if (datalen == length + fraggap) in __ip_append_data() 1142 copy = datalen - transhdrlen - fraggap - pagedlen; in __ip_append_data()
|