Searched refs:dccph_doff (Results 1 - 12 of 12) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/tcpdump-4.4.0/
H A Ddccp.h19 * @dccph_doff - Data Offset from the start of the DCCP header, in 32-bit words
30 u_int8_t dccph_doff; member in struct:dccp_hdr
H A Dprint-dccp.c69 cov = (dh->dccph_doff + DCCPH_CSCOV(dh) - 1) * sizeof(u_int32_t);
203 hlen = dh->dccph_doff * 4;
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/netfilter/
H A Dxt_dccp.c46 unsigned int optlen = dh->dccph_doff*4 - __dccp_hdr_len(dh);
49 if (dh->dccph_doff * 4 < __dccp_hdr_len(dh))
H A Dnf_conntrack_proto_dccp.c581 if (dh->dccph_doff * 4 < sizeof(struct dccp_hdr) ||
582 dh->dccph_doff * 4 > dccp_len) {
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/dccp/
H A Doutput.c104 dh->dccph_doff = (dccp_header_size + dcb->dccpd_opt_len) / 4;
374 dh->dccph_doff = (dccp_header_size +
417 dh->dccph_doff = dccp_hdr_reset_len / 4;
H A Dipv4.c735 if (dh->dccph_doff < dccp_hdr_len(skb) / sizeof(u32)) {
736 DCCP_WARN("P.Data Offset(%u) too small\n", dh->dccph_doff);
742 if (!pskb_may_pull(skb, dh->dccph_doff * sizeof(u32))) {
743 DCCP_WARN("P.Data Offset(%u) too large\n", dh->dccph_doff);
H A Ddccp.h213 return (dh->dccph_doff + dh->dccph_cscov - 1) * sizeof(u32);
H A Dinput.c28 __skb_pull(skb, dccp_hdr(skb)->dccph_doff * 4);
H A Doptions.c61 (dh->dccph_doff * 4);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/
H A Ddccp.h12 * @dccph_doff - Data Offset from the start of the DCCP header, in 32-bit words
23 __u8 dccph_doff; member in struct:dccp_hdr
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/dccp/ccids/
H A Dccid3.c776 const u32 payload = skb->len - dccp_hdr(skb)->dccph_doff * 4;
793 const u32 payload = skb->len - dccp_hdr(skb)->dccph_doff * 4;
H A Dccid2.c277 (dh->dccph_doff * 4);

Completed in 65 milliseconds