Lines Matching refs:data_size

34 	__be32	data_size;	/* true data size (excluding padding) */  member
38 __be32 data_size; /* true data size (excluding padding) */ member
262 struct sk_buff *skb, u32 data_size, in rxkad_secure_packet_auth() argument
275 data_size |= (u32)check << 16; in rxkad_secure_packet_auth()
277 hdr.data_size = htonl(data_size); in rxkad_secure_packet_auth()
280 pad = sizeof(struct rxkad_level1_hdr) + data_size; in rxkad_secure_packet_auth()
305 u32 data_size, in rxkad_secure_packet_encrypt() argument
324 rxkhdr.data_size = htonl(data_size | (u32)check << 16); in rxkad_secure_packet_encrypt()
328 pad = sizeof(struct rxkad_level2_hdr) + data_size; in rxkad_secure_packet_encrypt()
349 len = round_up(data_size, RXKAD_ALIGN); in rxkad_secure_packet_encrypt()
371 size_t data_size) in rxkad_secure_packet() argument
384 sp->hdr.seq, data_size); in rxkad_secure_packet()
424 ret = rxkad_secure_packet_auth(call, skb, data_size, req); in rxkad_secure_packet()
427 ret = rxkad_secure_packet_encrypt(call, skb, data_size, req); in rxkad_secure_packet()
450 u32 data_size, buf; in rxkad_verify_packet_1() local
487 buf = ntohl(sechdr.data_size); in rxkad_verify_packet_1()
488 data_size = buf & 0xffff; in rxkad_verify_packet_1()
499 if (data_size > len) { in rxkad_verify_packet_1()
505 _leave(" = 0 [dlen=%x]", data_size); in rxkad_verify_packet_1()
527 u32 data_size, buf; in rxkad_verify_packet_2() local
580 buf = ntohl(sechdr.data_size); in rxkad_verify_packet_2()
581 data_size = buf & 0xffff; in rxkad_verify_packet_2()
592 if (data_size > len) { in rxkad_verify_packet_2()
598 _leave(" = 0 [dlen=%x]", data_size); in rxkad_verify_packet_2()
691 *_len = ntohl(sechdr.data_size) & 0xffff; in rxkad_locate_data_1()
705 *_len = ntohl(sechdr.data_size) & 0xffff; in rxkad_locate_data_2()