Home
last modified time | relevance | path

Searched refs:req_size (Results 1 – 5 of 5) sorted by relevance

/net/tipc/
A Dnetlink_compat.c59 int req_size; member
282 if (msg->req_type && (!msg->req_size || in tipc_nl_compat_dumpit()
389 if (msg->req_type && (!msg->req_size || in tipc_nl_compat_doit()
1314 msg.req_size = nlmsg_attrlen(req_nlh, GENL_HDRLEN + TIPC_GENL_HDRLEN); in tipc_nl_compat_recv()
1315 if (msg.req_size && !TLV_OK(msg.req, msg.req_size)) { in tipc_nl_compat_recv()
A Dcrypto.c690 unsigned int iv_size, req_size; in tipc_aead_mem_alloc() local
695 req_size = sizeof(**req) + crypto_aead_reqsize(tfm); in tipc_aead_mem_alloc()
701 len += req_size; in tipc_aead_mem_alloc()
713 *sg = (struct scatterlist *)PTR_ALIGN((u8 *)*req + req_size, in tipc_aead_mem_alloc()
/net/tls/
A Dtls_device_fallback.c121 unsigned int req_size = sizeof(struct aead_request) + in tls_alloc_aead_request() local
125 aead_req = kzalloc(req_size, flags); in tls_alloc_aead_request()
/net/key/
A Daf_key.c2159 int req_size; in pfkey_xfrm_policy2msg() local
2162 req_size = sizeof(struct sadb_x_ipsecrequest); in pfkey_xfrm_policy2msg()
2165 req_size += socklen * 2; in pfkey_xfrm_policy2msg()
2169 rq = skb_put(skb, req_size); in pfkey_xfrm_policy2msg()
2170 pol->sadb_x_policy_len += req_size/8; in pfkey_xfrm_policy2msg()
2172 rq->sadb_x_ipsecrequest_len = req_size; in pfkey_xfrm_policy2msg()
/net/openvswitch/
A Dflow_netlink.c2470 size_t req_size = NLA_ALIGN(attr_len); in reserve_sfa_size() local
2474 if (req_size <= (ksize(*sfa) - next_offset)) in reserve_sfa_size()
2477 new_acts_size = max(next_offset + req_size, ksize(*sfa) * 2); in reserve_sfa_size()
2490 (*sfa)->actions_len += req_size; in reserve_sfa_size()

Completed in 25 milliseconds