/kernel/linux/linux-6.6/net/ipv6/netfilter/ |
H A D | nf_reject_ipv6.c | 20 u8 proto = ip6h->nexthdr; in nf_reject_v6_csum_ok() local 30 thoff = ipv6_skip_exthdr(skb, ((u8*)(ip6h+1) - skb->data), &proto, &fo); in nf_reject_v6_csum_ok() 34 if (!nf_reject_verify_csum(skb, thoff, proto)) in nf_reject_v6_csum_ok() 37 return nf_ip6_checksum(skb, hook, thoff, proto) == 0; in nf_reject_v6_csum_ok() 154 u8 proto; in nf_reject_ip6_tcphdr_get() local 158 proto = oip6h->nexthdr; in nf_reject_ip6_tcphdr_get() 160 &proto, &frag_off); in nf_reject_ip6_tcphdr_get() 170 if (proto != IPPROTO_TCP || *otcplen < sizeof(struct tcphdr)) { in nf_reject_ip6_tcphdr_get() 171 pr_debug("proto(%d) != IPPROTO_TCP or too short (len = %d)\n", in nf_reject_ip6_tcphdr_get() 172 proto, *otcple in nf_reject_ip6_tcphdr_get() 386 u8 proto; reject6_csum_ok() local [all...] |
/third_party/protobuf/conformance/ |
H A D | binary_json_conformance_suite.cc | 367 << "yielded unparseable proto."; in ParseJsonResponse() 431 const string& proto, const string& test_name, ConformanceLevel level, in ExpectParseFailureForProtoWithProtoVersion() 439 *prototype, test_name, proto); in ExpectParseFailureForProtoWithProtoVersion() 460 const string& proto, const string& test_name, ConformanceLevel level) { in ExpectParseFailureForProto() 461 ExpectParseFailureForProtoWithProtoVersion(proto, test_name, level, true); in ExpectParseFailureForProto() 462 ExpectParseFailureForProtoWithProtoVersion(proto, test_name, level, false); in ExpectParseFailureForProto() 471 const string& proto, const string& test_name, ConformanceLevel level) { in ExpectHardParseFailureForProto() 472 return ExpectParseFailureForProto(proto, test_name, level); in ExpectHardParseFailureForProto() 559 // According to proto JSON specification, JSON serializers follow more strict 562 // method allows strict checking on a proto JSO 430 ExpectParseFailureForProtoWithProtoVersion( const string& proto, const string& test_name, ConformanceLevel level, bool is_proto3) ExpectParseFailureForProtoWithProtoVersion() argument 459 ExpectParseFailureForProto( const string& proto, const string& test_name, ConformanceLevel level) ExpectParseFailureForProto() argument 470 ExpectHardParseFailureForProto( const string& proto, const string& test_name, ConformanceLevel level) ExpectHardParseFailureForProto() argument 760 string proto = cat(tag(field->number(), wire_type), values[i].first); TestValidDataForType() local 782 string proto; TestValidDataForType() local 891 string proto; TestValidDataForType() local 933 string proto; TestValidDataForRepeatedScalarMessage() local 972 string proto = TestValidDataForMapType() local 985 string proto = TestValidDataForMapType() local 998 string proto = TestValidDataForMapType() local 1011 string proto = TestValidDataForMapType() local 1030 string proto = cat(proto1, proto2); TestValidDataForMapType() local 1041 string proto = TestValidDataForMapType() local 1055 string proto = TestValidDataForMapType() local 1097 string proto = cat(proto1, proto2); TestOverwriteMessageValueMap() local 1122 const string proto = default_value; TestValidDataForOneofType() local 1137 const string proto = non_default_value; TestValidDataForOneofType() local 1152 const string proto = StrCat(default_value, non_default_value); TestValidDataForOneofType() local 1178 const string proto = StrCat(other_value, non_default_value); TestValidDataForOneofType() local 1220 string proto = cat(proto1, proto2); TestMergeOneofMessage() local [all...] |
/kernel/linux/linux-5.10/net/netfilter/ |
H A D | xt_CT.c | 61 return e->ip.proto; in xt_ct_find_proto() 67 return e->ipv6.proto; in xt_ct_find_proto() 78 u8 proto; in xt_ct_set_helper() local 80 proto = xt_ct_find_proto(par); in xt_ct_set_helper() 81 if (!proto) { in xt_ct_set_helper() 87 proto); in xt_ct_set_helper() 109 u8 proto; in xt_ct_set_timeout() local 111 proto = xt_ct_find_proto(par); in xt_ct_set_timeout() 112 if (!proto) { in xt_ct_set_timeout() 117 l4proto = nf_ct_l4proto_find(proto); in xt_ct_set_timeout() [all...] |
/kernel/linux/linux-5.10/include/linux/mtd/ |
H A D | spi-nor.h | 187 static inline bool spi_nor_protocol_is_dtr(enum spi_nor_protocol proto) in spi_nor_protocol_is_dtr() argument 189 return !!(proto & SNOR_PROTO_IS_DTR); in spi_nor_protocol_is_dtr() 192 static inline u8 spi_nor_get_protocol_inst_nbits(enum spi_nor_protocol proto) in spi_nor_get_protocol_inst_nbits() argument 194 return ((unsigned long)(proto & SNOR_PROTO_INST_MASK)) >> in spi_nor_get_protocol_inst_nbits() 198 static inline u8 spi_nor_get_protocol_addr_nbits(enum spi_nor_protocol proto) in spi_nor_get_protocol_addr_nbits() argument 200 return ((unsigned long)(proto & SNOR_PROTO_ADDR_MASK)) >> in spi_nor_get_protocol_addr_nbits() 204 static inline u8 spi_nor_get_protocol_data_nbits(enum spi_nor_protocol proto) in spi_nor_get_protocol_data_nbits() argument 206 return ((unsigned long)(proto & SNOR_PROTO_DATA_MASK)) >> in spi_nor_get_protocol_data_nbits() 210 static inline u8 spi_nor_get_protocol_width(enum spi_nor_protocol proto) in spi_nor_get_protocol_width() argument 212 return spi_nor_get_protocol_data_nbits(proto); in spi_nor_get_protocol_width() [all...] |
/kernel/linux/linux-5.10/net/ipv6/netfilter/ |
H A D | nf_reject_ipv6.c | 20 u8 proto; in nf_reject_ip6_tcphdr_get() local 24 proto = oip6h->nexthdr; in nf_reject_ip6_tcphdr_get() 26 &proto, &frag_off); in nf_reject_ip6_tcphdr_get() 36 if (proto != IPPROTO_TCP || *otcplen < sizeof(struct tcphdr)) { in nf_reject_ip6_tcphdr_get() 37 pr_debug("proto(%d) != IPPROTO_TCP or too short (len = %d)\n", in nf_reject_ip6_tcphdr_get() 38 proto, *otcplen); in nf_reject_ip6_tcphdr_get() 246 u8 proto; in reject6_csum_ok() local 251 proto = ip6h->nexthdr; in reject6_csum_ok() 252 thoff = ipv6_skip_exthdr(skb, ((u8 *)(ip6h + 1) - skb->data), &proto, &fo); in reject6_csum_ok() 257 if (!nf_reject_verify_csum(proto)) in reject6_csum_ok() [all...] |
/kernel/linux/linux-6.6/include/linux/mtd/ |
H A D | spi-nor.h | 178 static inline bool spi_nor_protocol_is_dtr(enum spi_nor_protocol proto) in spi_nor_protocol_is_dtr() argument 180 return !!(proto & SNOR_PROTO_IS_DTR); in spi_nor_protocol_is_dtr() 183 static inline u8 spi_nor_get_protocol_inst_nbits(enum spi_nor_protocol proto) in spi_nor_get_protocol_inst_nbits() argument 185 return ((unsigned long)(proto & SNOR_PROTO_INST_MASK)) >> in spi_nor_get_protocol_inst_nbits() 189 static inline u8 spi_nor_get_protocol_addr_nbits(enum spi_nor_protocol proto) in spi_nor_get_protocol_addr_nbits() argument 191 return ((unsigned long)(proto & SNOR_PROTO_ADDR_MASK)) >> in spi_nor_get_protocol_addr_nbits() 195 static inline u8 spi_nor_get_protocol_data_nbits(enum spi_nor_protocol proto) in spi_nor_get_protocol_data_nbits() argument 197 return ((unsigned long)(proto & SNOR_PROTO_DATA_MASK)) >> in spi_nor_get_protocol_data_nbits() 201 static inline u8 spi_nor_get_protocol_width(enum spi_nor_protocol proto) in spi_nor_get_protocol_width() argument 203 return spi_nor_get_protocol_data_nbits(proto); in spi_nor_get_protocol_width() [all...] |
/kernel/linux/linux-6.6/net/netfilter/ |
H A D | xt_CT.c | 61 return e->ip.proto; in xt_ct_find_proto() 67 return e->ipv6.proto; in xt_ct_find_proto() 78 u8 proto; in xt_ct_set_helper() local 80 proto = xt_ct_find_proto(par); in xt_ct_set_helper() 81 if (!proto) { in xt_ct_set_helper() 87 proto); in xt_ct_set_helper() 109 u8 proto; in xt_ct_set_timeout() local 111 proto = xt_ct_find_proto(par); in xt_ct_set_timeout() 112 if (!proto) { in xt_ct_set_timeout() 117 l4proto = nf_ct_l4proto_find(proto); in xt_ct_set_timeout() [all...] |
/kernel/linux/linux-6.6/samples/bpf/ |
H A D | sockex3_kern.c | 40 static inline void parse_eth_proto(struct __sk_buff *skb, u32 proto); 116 __be16 proto; in parse_ip_proto() member 122 nhoff + offsetof(struct gre_hdr, proto)); in parse_ip_proto() 213 __u32 nhoff, proto; in bpf_func_vlan() local 217 proto = load_half(skb, nhoff + offsetof(struct vlan_hdr, in bpf_func_vlan() 222 parse_eth_proto(skb, proto); in bpf_func_vlan() 266 * on eth proto. Note, we could have used ... 268 * bpf_tail_call(skb, &prog_array_init, proto); 273 static inline void parse_eth_proto(struct __sk_buff *skb, u32 proto) in parse_eth_proto() argument 275 switch (proto) { in parse_eth_proto() 297 __u32 proto = load_half(skb, 12); main_prog() local [all...] |
/third_party/python/Lib/test/ |
H A D | test_list.py | 125 for proto in range(pickle.HIGHEST_PROTOCOL + 1): 128 d = pickle.dumps((itorig, orig), proto) 136 d = pickle.dumps((itorig, orig), proto) 145 d = pickle.dumps((itorig, orig), proto) 153 d = pickle.dumps((itorig, orig), proto) 161 for proto in range(pickle.HIGHEST_PROTOCOL + 1): 164 d = pickle.dumps((itorig, orig), proto) 172 d = pickle.dumps((itorig, orig), proto) 181 d = pickle.dumps((itorig, orig), proto) 189 d = pickle.dumps((itorig, orig), proto) [all...] |
H A D | test_itertools.py | 81 picklecopiers = [lambda s, proto=proto: pickle.loads(pickle.dumps(s, proto)) 82 for proto in range(pickle.HIGHEST_PROTOCOL + 1)] 153 for proto in range(pickle.HIGHEST_PROTOCOL + 1): 154 self.pickletest(proto, accumulate(range(10))) # test pickling 155 self.pickletest(proto, accumulate(range(10), initial=7)) 194 for proto in range(pickle.HIGHEST_PROTOCOL + 1): 195 self.pickletest(proto, chain('abc', 'def'), compare=list('abcdef')) 287 for proto i [all...] |
/kernel/linux/linux-5.10/net/xfrm/ |
H A D | xfrm_state.c | 76 __be32 spi, u8 proto, unsigned short family) in xfrm_spi_hash() 78 return __xfrm_spi_hash(daddr, spi, proto, family, net->xfrm.state_hmask); in xfrm_spi_hash() 105 x->id.proto, x->props.family, in xfrm_hash_transfer() 194 switch (type->proto) { in xfrm_register_type() 239 switch (type->proto) { in xfrm_unregister_type() 270 static const struct xfrm_type *xfrm_get_type(u8 proto, unsigned short family) in xfrm_get_type() argument 281 switch (proto) { in xfrm_get_type() 313 request_module("xfrm-type-%d-%d", family, proto); in xfrm_get_type() 335 switch (type->proto) { in xfrm_register_type_offload() 359 switch (type->proto) { in xfrm_unregister_type_offload() 75 xfrm_spi_hash(struct net *net, const xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family) xfrm_spi_hash() argument 373 xfrm_get_type_offload(u8 proto, unsigned short family, bool try_load) xfrm_get_type_offload() argument 703 xfrm_state_flush_secctx_check(struct net *net, u8 proto, bool task_valid) xfrm_state_flush_secctx_check() argument 746 xfrm_state_flush_secctx_check(struct net *net, u8 proto, bool task_valid) xfrm_state_flush_secctx_check() argument 758 xfrm_state_flush(struct net *net, u8 proto, bool task_valid, bool sync) xfrm_state_flush() argument 929 __xfrm_state_lookup(struct net *net, u32 mark, const xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family) __xfrm_state_lookup() argument 954 __xfrm_state_lookup_byaddr(struct net *net, u32 mark, const xfrm_address_t *daddr, const xfrm_address_t *saddr, u8 proto, unsigned short family) __xfrm_state_lookup_byaddr() argument 1190 xfrm_stateonly_find(struct net *net, u32 mark, u32 if_id, xfrm_address_t *daddr, xfrm_address_t *saddr, unsigned short family, u8 mode, u8 proto, u32 reqid) xfrm_stateonly_find() argument 1310 __find_acq_core(struct net *net, const struct xfrm_mark *m, unsigned short family, u8 mode, u32 reqid, u32 if_id, u8 proto, const xfrm_address_t *daddr, const xfrm_address_t *saddr, int create) __find_acq_core() argument 1775 xfrm_state_lookup(struct net *net, u32 mark, const xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family) xfrm_state_lookup() argument 1788 xfrm_state_lookup_byaddr(struct net *net, u32 mark, const xfrm_address_t *daddr, const xfrm_address_t *saddr, u8 proto, unsigned short family) xfrm_state_lookup_byaddr() argument 1802 xfrm_find_acq(struct net *net, const struct xfrm_mark *mark, u8 mode, u32 reqid, u32 if_id, u8 proto, const xfrm_address_t *daddr, const xfrm_address_t *saddr, int create, unsigned short family) xfrm_find_acq() argument 1987 verify_spi_info(u8 proto, u32 min, u32 max) verify_spi_info() argument 2127 xfrm_state_walk_init(struct xfrm_state_walk *walk, u8 proto, struct xfrm_address_filter *filter) xfrm_state_walk_init() argument 2295 km_report(struct net *net, u8 proto, struct xfrm_selector *sel, xfrm_address_t *addr) km_report() argument 2865 xfrm_audit_state_icvfail(struct xfrm_state *x, struct sk_buff *skb, u8 proto) xfrm_audit_state_icvfail() argument [all...] |
/kernel/linux/linux-5.10/tools/testing/selftests/net/ |
H A D | ipsec.c | 154 static int netlink_sock(int *sock, uint32_t *seq_nr, int proto) in netlink_sock() argument 161 *sock = socket(AF_NETLINK, SOCK_RAW | SOCK_CLOEXEC, proto); in netlink_sock() 497 uint8_t proto; member 858 switch (desc->proto) { in xfrm_state_pack_algo() 911 printk("BUG: unknown proto in desc"); in xfrm_state_pack_algo() 953 req.info.id.proto = desc->proto; in xfrm_state_add() 992 if (info->id.spi != spi || info->id.proto != desc->proto) in xfrm_usersa_found() 1110 struct in_addr tunsrc, struct in_addr tundst, uint8_t proto) in xfrm_policy_add() 1108 xfrm_policy_add(int xfrm_sock, uint32_t seq, uint32_t spi, struct in_addr src, struct in_addr dst, uint8_t dir, struct in_addr tunsrc, struct in_addr tundst, uint8_t proto) xfrm_policy_add() argument 1164 xfrm_prepare(int xfrm_sock, uint32_t *seq, struct in_addr src, struct in_addr dst, struct in_addr tunsrc, struct in_addr tundst, uint8_t proto) xfrm_prepare() argument 1234 xfrm_state_del(int xfrm_sock, uint32_t seq, uint32_t spi, struct in_addr src, struct in_addr dst, uint8_t proto) xfrm_state_del() argument 1268 xfrm_delete(int xfrm_sock, uint32_t *seq, struct in_addr src, struct in_addr dst, struct in_addr tunsrc, struct in_addr tundst, uint8_t proto) xfrm_delete() argument 1285 xfrm_state_allocspi(int xfrm_sock, uint32_t *seq, uint32_t spi, uint8_t proto) xfrm_state_allocspi() argument 1337 netlink_sock_bind(int *sock, uint32_t *seq, int proto, uint32_t groups) netlink_sock_bind() argument 1893 write_desc(int proto, int test_desc_fd, char *a, char *e, char *c, char *ae) write_desc() argument 1943 write_proto_plan(int fd, int proto) write_proto_plan() argument [all...] |
H A D | vrf-xfrm-tests.sh | 223 tmpl src ${HOST1_4} dst ${HOST2_4} proto esp mode tunnel 228 tmpl src ${HOST1_4} dst ${HOST2_4} proto esp mode tunnel 233 tmpl src ${HOST2_4} dst ${HOST1_4} proto esp mode tunnel 238 tmpl src ${HOST2_4} dst ${HOST1_4} proto esp mode tunnel 244 tmpl src ${HOST1_6} dst ${HOST2_6} proto esp mode tunnel 249 tmpl src ${HOST1_6} dst ${HOST2_6} proto esp mode tunnel 254 tmpl src ${HOST2_6} dst ${HOST1_6} proto esp mode tunnel 259 tmpl src ${HOST2_6} dst ${HOST1_6} proto esp mode tunnel 265 proto esp spi ${SPI_1} reqid 0 mode tunnel \ 272 proto es [all...] |
/third_party/curl/lib/ |
H A D | imap.c | 257 struct imap_conn *imapc = &conn->proto.imapc; in imap_endofresp() 358 char *message = Curl_dyn_ptr(&data->conn->proto.imapc.pp.recvbuf); in imap_get_message() 359 size_t len = data->conn->proto.imapc.pp.nfinal; in imap_get_message() 392 struct imap_conn *imapc = &data->conn->proto.imapc; in imap_state() 433 struct imap_conn *imapc = &conn->proto.imapc; in imap_perform_capability() 474 struct imap_conn *imapc = &conn->proto.imapc; in imap_perform_upgrade_tls() 573 struct imap_conn *imapc = &data->conn->proto.imapc; in imap_continue_authenticate() 590 struct imap_conn *imapc = &data->conn->proto.imapc; in imap_cancel_authenticate() 609 struct imap_conn *imapc = &conn->proto.imapc; in imap_perform_authentication() 684 struct imap_conn *imapc = &conn->proto in imap_perform_select() [all...] |
H A D | openldap.c | 93 extern int ldap_init_fd(ber_socket_t fd, int proto, const char *url, 192 int proto; /* LDAP_PROTO_TCP/LDAP_PROTO_UDP/LDAP_PROTO_IPC */ member 208 struct ldapconninfo *ldapc = data->conn->proto.ldapc; in oldap_state() 290 struct ldapconninfo *li = conn->proto.ldapc; in oldap_parse_login_options() 336 struct berval *servercred = data->conn->proto.ldapc->servercred; in oldap_get_message() 351 struct ldapconninfo *li = conn->proto.ldapc; in oldap_perform_auth() 374 struct ldapconninfo *li = conn->proto.ldapc; in oldap_continue_auth() 395 struct ldapconninfo *li = data->conn->proto.ldapc; in oldap_cancel_auth() 411 struct ldapconninfo *li = conn->proto.ldapc; in oldap_perform_bind() 440 struct ldapconninfo *li = data->conn->proto in oldap_perform_mechs() [all...] |
/third_party/libcoap/src/ |
H A D | coap_pdu.c | 929 coap_pdu_parse_header_size(coap_proto_t proto, in coap_pdu_parse_header_size() argument 934 if (proto == COAP_PROTO_TCP || proto==COAP_PROTO_TLS) { in coap_pdu_parse_header_size() 944 } else if (proto == COAP_PROTO_WS || proto==COAP_PROTO_WSS) { in coap_pdu_parse_header_size() 946 } else if (proto == COAP_PROTO_UDP || proto==COAP_PROTO_DTLS) { in coap_pdu_parse_header_size() 959 coap_pdu_parse_size(coap_proto_t proto, in coap_pdu_parse_size() argument 963 assert(proto == COAP_PROTO_TCP || proto in coap_pdu_parse_size() 1011 coap_pdu_parse_header(coap_pdu_t *pdu, coap_proto_t proto) coap_pdu_parse_header() argument 1397 coap_pdu_parse(coap_proto_t proto, const uint8_t *data, size_t length, coap_pdu_t *pdu) coap_pdu_parse() argument 1420 coap_pdu_encode_header(coap_pdu_t *pdu, coap_proto_t proto) coap_pdu_encode_header() argument [all...] |
/kernel/linux/linux-5.10/arch/x86/um/asm/ |
H A D | checksum.h | 48 * @proto: ip protocol of packet 56 __u8 proto, __wsum sum) in csum_tcpudp_nofold() 63 : "g" (daddr), "g" (saddr), "g" ((len + proto) << 8), "0" (sum)); in csum_tcpudp_nofold() 72 __u32 len, __u8 proto, in csum_tcpudp_magic() 75 return csum_fold(csum_tcpudp_nofold(saddr,daddr,len,proto,sum)); in csum_tcpudp_magic() 55 csum_tcpudp_nofold(__be32 saddr, __be32 daddr, __u32 len, __u8 proto, __wsum sum) csum_tcpudp_nofold() argument 71 csum_tcpudp_magic(__be32 saddr, __be32 daddr, __u32 len, __u8 proto, __wsum sum) csum_tcpudp_magic() argument
|
/kernel/linux/linux-5.10/include/net/ |
H A D | ncsi.h | 32 int ncsi_vlan_rx_add_vid(struct net_device *dev, __be16 proto, u16 vid); 33 int ncsi_vlan_rx_kill_vid(struct net_device *dev, __be16 proto, u16 vid); 40 static inline int ncsi_vlan_rx_add_vid(struct net_device *dev, __be16 proto, u16 vid) in ncsi_vlan_rx_add_vid() argument 45 static inline int ncsi_vlan_rx_kill_vid(struct net_device *dev, __be16 proto, u16 vid) in ncsi_vlan_rx_kill_vid() argument
|
/kernel/linux/linux-6.6/include/net/ |
H A D | ncsi.h | 34 int ncsi_vlan_rx_add_vid(struct net_device *dev, __be16 proto, u16 vid); 35 int ncsi_vlan_rx_kill_vid(struct net_device *dev, __be16 proto, u16 vid); 42 static inline int ncsi_vlan_rx_add_vid(struct net_device *dev, __be16 proto, u16 vid) in ncsi_vlan_rx_add_vid() argument 47 static inline int ncsi_vlan_rx_kill_vid(struct net_device *dev, __be16 proto, u16 vid) in ncsi_vlan_rx_kill_vid() argument
|
H A D | gro.h | 45 u16 proto; member 186 static inline __wsum inet_gro_compute_pseudo(struct sk_buff *skb, int proto) in inet_gro_compute_pseudo() argument 191 skb_gro_len(skb), proto, 0); in inet_gro_compute_pseudo() 252 #define __skb_gro_checksum_validate(skb, proto, zero_okay, check, \ 258 compute_pseudo(skb, proto)); \ 264 #define skb_gro_checksum_validate(skb, proto, compute_pseudo) \ 265 __skb_gro_checksum_validate(skb, proto, false, 0, compute_pseudo) 267 #define skb_gro_checksum_validate_zero_check(skb, proto, check, \ 269 __skb_gro_checksum_validate(skb, proto, true, check, compute_pseudo) 287 #define skb_gro_checksum_try_convert(skb, proto, compute_pseud 424 ip6_gro_compute_pseudo(struct sk_buff *skb, int proto) ip6_gro_compute_pseudo() argument [all...] |
/kernel/linux/linux-6.6/arch/x86/um/asm/ |
H A D | checksum.h | 48 * @proto: ip protocol of packet 56 __u8 proto, __wsum sum) in csum_tcpudp_nofold() 63 : "g" (daddr), "g" (saddr), "g" ((len + proto) << 8), "0" (sum)); in csum_tcpudp_nofold() 72 __u32 len, __u8 proto, in csum_tcpudp_magic() 75 return csum_fold(csum_tcpudp_nofold(saddr,daddr,len,proto,sum)); in csum_tcpudp_magic() 55 csum_tcpudp_nofold(__be32 saddr, __be32 daddr, __u32 len, __u8 proto, __wsum sum) csum_tcpudp_nofold() argument 71 csum_tcpudp_magic(__be32 saddr, __be32 daddr, __u32 len, __u8 proto, __wsum sum) csum_tcpudp_magic() argument
|
/third_party/python/Lib/asyncio/ |
H A D | protocols.py | 200 def _feed_data_to_buffered_proto(proto, data): 203 buf = proto.get_buffer(data_len) 210 proto.buffer_updated(data_len) 214 proto.buffer_updated(buf_len)
|
/third_party/selinux/libsepol/include/sepol/ |
H A D | port_record.h | 29 int low, int high, int proto, 33 int *low, int *high, int *proto); 44 extern void sepol_port_set_proto(sepol_port_t * port, int proto); 46 extern const char *sepol_port_get_proto_str(int proto);
|
/third_party/node/deps/npm/node_modules/jsonparse/ |
H A D | jsonparse.js | 86 var proto = Parser.prototype; 87 proto.onError = function (err) { throw err; }; 88 proto.charError = function (buffer, i) { 92 proto.appendStringChar = function (char) { 100 proto.appendStringBuf = function (buf, start, end) { 127 proto.write = function (buffer) { 315 proto.onToken = function (token, value) { 319 proto.parseError = function (token, value) { 323 proto.push = function () { 326 proto [all...] |
/kernel/linux/linux-5.10/drivers/net/ethernet/intel/ixgbevf/ |
H A D | ipsec.c | 30 sam->proto = xs->id.proto; in ixgbevf_ipsec_set_pf_sa() 171 * @proto: protocol to match 179 __be32 *daddr, u8 proto, in ixgbevf_ipsec_find_rx_state() 192 proto == rsa->xs->id.proto) { in ixgbevf_ipsec_find_rx_state() 272 if (xs->id.proto != IPPROTO_ESP && xs->id.proto != IPPROTO_AH) { in ixgbevf_ipsec_add_sa() 274 xs->id.proto); in ixgbevf_ipsec_add_sa() 303 if (rsa.xs->id.proto in ixgbevf_ipsec_add_sa() 178 ixgbevf_ipsec_find_rx_state(struct ixgbevf_ipsec *ipsec, __be32 *daddr, u8 proto, __be32 spi, bool ip4) ixgbevf_ipsec_find_rx_state() argument 566 u8 proto; ixgbevf_ipsec_rx() local [all...] |