Lines Matching refs:len

105 #define	_IN6_LLX_FROM_EUI64(l, s, eui64, as, len)	\
110 l.lifr_addrlen = len, \
115 * EUI64 identifier. Note that the len field is unused by SIOCSLIFADDR.
1443 output(unit, p, len)
1446 int len;
1453 data.len = len;
1476 dbglog("sent %P", p, len);
1549 dump_packet(uchar_t *buf, int len)
1561 if (len < 4) {
1562 notice("strange link activity: %.*B", len, buf);
1571 len -= bp-buf;
1574 if (len < IP_HDRLEN || get_ipv(bp) != 4 || get_iphl(bp) < 5) {
1575 notice("strange IP packet activity: %16.*B", len, buf);
1589 len -= get_iphl(bp) * 4;
1592 len, bp);
1594 if (len > get_iplen(bp))
1595 len = get_iplen(bp);
1596 len -= get_iphl(bp) * 4;
1601 len-offs,
1605 len-offs, bp+offs);
1607 notice("%s %d bytes %I->%I: %8.*B", cp, len,
1608 src, dst, len, bp);
1613 if (len < IP6_HDRLEN) {
1614 notice("strange IPv6 activity: %16.*B", len, buf);
1634 len -= IP6_HDRLEN;
1639 len-offs,
1643 len-offs, bp+offs);
1645 notice("%s %d bytes %s->%s: %8.*B", cp, len,
1646 fromstr, tostr, len, bp);
1653 notice("link activity: %s %16.*B", cp, len, bp);
1754 int len;
1770 rc = len = getmsg(pppfd, &ctrl, &data, &flags);
1772 rc = len = (*sys_read_packet_hook)(len, &ctrl, &data,
1775 if (len < 0) {
1781 if ((data.len > 0) && (ctrl.len < 0)) {
1793 return (data.len);
1795 } else if (ctrl.len > 0) {
1808 if (ctrl.len < sizeof (struct ppp_ls)) {
1809 warn("read_packet: ctl.len %d < "
1811 ctrl.len, sizeof (struct ppp_ls));
1833 if (data.len > 0)
1834 dump_packet(buf, data.len);
2977 req.hdr.len = 0;
2980 cbuf.len = sizeof (req);
2999 if (cbuf.len < sizeof (struct T_optmgmt_ack) ||
3003 dbglog("have_route_to: bad message len=%d prim=%d",
3004 cbuf.len, ack.ack.PRIM_type);
3028 nroutes = dbuf.len / sizeof (mib2_ipRouteEntry_t);