Lines Matching +defs:list +defs:length

12  *    notice, this list of conditions and the following disclaimer.
14 * notice, this list of conditions and the following disclaimer in the
117 /* Invalid length */
374 mp->length =
412 /* Invalid length */
780 /* invalid param length for this param */
783 printf("Bogus length in error param- chunk left:%d errorlen:%d\n",
911 /* Invalid length */
1403 * length: length of the cookie chunk
2599 uint16_t *list, temp;
2607 list = resp->list_of_streams;
2609 temp = ntohs(list[i]);
2610 list[i] = temp;
2611 if (list[i] >= stcb->asoc.streamincnt) {
2612 printf("Invalid stream in-stream reset %d\n", list[i]);
2615 stcb->asoc.strmin[(list[i])].last_sequence_delivered = 0xffff;
2618 list = NULL;
2623 sctp_ulp_notify(SCTP_NOTIFY_STR_RESET_RECV, stcb, number_entries, (void *)list);
3017 * - length: is the length of the complete packet
3019 * - length: modified to remaining length after control processing
3025 sctp_process_control(struct mbuf *m, int iphlen, int *offset, int length,
3045 printf("sctp_process_control: iphlen=%u, offset=%u, length=%u stcb:%p\n",
3046 iphlen, *offset, length, stcb);
3050 /* validate chunk header length... */
3096 *offset = length;
3149 *offset = length;
3173 /* validate chunk length */
3181 (*offset + chk_length) > length) {
3184 printf("sctp_process_control: chunk length invalid! *offset:%u, chk_length:%u > length:%u\n",
3185 *offset, chk_length, length);
3188 *offset = length;
3205 *offset = length;
3239 *offset = length;
3272 *offset = length;
3276 (sctp_strict_init && (length - *offset > SCTP_SIZE32(chk_length)))) {
3277 *offset = length;
3288 *offset = length;
3296 *offset = length;
3314 *offset = length;
3326 (sctp_strict_init && (length - *offset > SCTP_SIZE32(chk_length)))) {
3330 length - *offset,
3334 *offset = length;
3348 *offset = length;
3373 *offset = length;
3413 *offset = length;
3427 *offset = length;
3439 *offset = length;
3449 *offset = length;
3461 *offset = length;
3483 *offset = length;
3507 *offset = length;
3519 printf("ret_buf:%p length:%d off:%d\n",
3520 ret_buf, length, *offset);
3533 *offset = length;
3561 *offset = length;
3599 (length - *offset > SCTP_SIZE32(chk_length))) {
3600 *offset = length;
3608 *offset = length;
3649 *offset = length;
3737 *offset = length;
3744 if (*offset >= length) {
3754 *offset = length;
3830 int length, struct sctphdr *sh, struct sctp_chunkhdr *ch,
3850 printf("Ok, Common input processing called, m:%p iphlen:%d offset:%d length:%d\n",
3851 m, iphlen, offset, length);
3862 stcb = sctp_process_control(m, iphlen, &offset, length, sh, ch,
3899 length, offset);
3905 /* plow through the data chunks while length > offset */
3908 if (length > offset) {
3957 /* plow through the data chunks while length > offset */
3958 retval = sctp_process_data(mm, iphlen, &offset, length, sh,
4066 int length, mlen, offset;
4168 /* validate mbuf chain length with IP payload length */
4252 length = ip->ip_len - (ip->ip_hl << 2) + iphlen;
4256 sctp_common_input_processing(&m, iphlen, offset, length, sh, ch,