Home
last modified time | relevance | path

Searched refs:dccph_doff (Results 1 – 9 of 9) sorted by relevance

/linux-4.4.14/net/netfilter/
Dxt_dccp.c46 unsigned int optlen = dh->dccph_doff*4 - __dccp_hdr_len(dh); in dccp_find_option()
49 if (dh->dccph_doff * 4 < __dccp_hdr_len(dh)) in dccp_find_option()
Dnf_conntrack_proto_dccp.c586 if (dh->dccph_doff * 4 < sizeof(struct dccp_hdr) || in dccp_error()
587 dh->dccph_doff * 4 > dccp_len) { in dccp_error()
/linux-4.4.14/include/uapi/linux/
Ddccp.h23 __u8 dccph_doff; member
/linux-4.4.14/net/dccp/
Doutput.c107 dh->dccph_doff = (dccp_header_size + dcb->dccpd_opt_len) / 4; in dccp_transmit_skb()
434 dh->dccph_doff = (dccp_header_size + in dccp_make_response()
477 dh->dccph_doff = dccp_hdr_reset_len / 4; in dccp_ctl_make_reset()
Dipv4.c720 if (dh->dccph_doff < dccp_hdr_len(skb) / sizeof(u32)) { in dccp_invalid_packet()
721 DCCP_WARN("P.Data Offset(%u) too small\n", dh->dccph_doff); in dccp_invalid_packet()
727 if (!pskb_may_pull(skb, dh->dccph_doff * sizeof(u32))) { in dccp_invalid_packet()
728 DCCP_WARN("P.Data Offset(%u) too large\n", dh->dccph_doff); in dccp_invalid_packet()
Dinput.c28 __skb_pull(skb, dccp_hdr(skb)->dccph_doff * 4); in dccp_enqueue_skb()
Doptions.c60 (dh->dccph_doff * 4); in dccp_parse_options()
Ddccp.h214 return (dh->dccph_doff + dh->dccph_cscov - 1) * sizeof(u32); in dccp_csum_coverage()
/linux-4.4.14/net/dccp/ccids/
Dccid3.c720 const u32 payload = skb->len - dccp_hdr(skb)->dccph_doff * 4; in ccid3_hc_rx_packet_recv()
737 const u32 payload = skb->len - dccp_hdr(skb)->dccph_doff * 4; in ccid3_hc_rx_packet_recv()