Lines Matching +full:4 +full:th
382 const struct tcphdr *th = (struct tcphdr *)(skb->data+offset); in tcp_v6_err() local
392 sk = __inet6_lookup_established(net, &hdr->daddr, th->dest, in tcp_v6_err()
393 &hdr->saddr, ntohs(th->source), in tcp_v6_err()
408 seq = ntohl(th->seq); in tcp_v6_err()
494 ipv6_icmp_error(sk, skb, err, th->dest, ntohl(info), (u8 *)th); in tcp_v6_err()
697 const struct tcphdr *th, int nbytes) in tcp_v6_md5_hash_headers() argument
711 memcpy(_th, th, sizeof(*th)); in tcp_v6_md5_hash_headers()
714 sg_init_one(&sg, bp, sizeof(*bp) + sizeof(*th)); in tcp_v6_md5_hash_headers()
716 sizeof(*bp) + sizeof(*th)); in tcp_v6_md5_hash_headers()
722 const struct tcphdr *th) in tcp_v6_md5_hash_hdr() argument
731 if (tcp_v6_md5_hash_headers(&hp, daddr, saddr, th, th->doff << 2)) in tcp_v6_md5_hash_hdr()
754 const struct tcphdr *th = tcp_hdr(skb); in tcp_v6_md5_hash_skb() local
773 if (tcp_v6_md5_hash_headers(&hp, daddr, saddr, th, skb->len)) in tcp_v6_md5_hash_skb()
775 if (tcp_sigpool_hash_skb_data(&hp, skb, th->doff << 2)) in tcp_v6_md5_hash_skb()
875 const struct tcphdr *th = tcp_hdr(skb); in tcp_v6_send_response() local
910 t1->dest = th->source; in tcp_v6_send_response()
911 t1->source = th->dest; in tcp_v6_send_response()
912 t1->doff = tot_len / 4; in tcp_v6_send_response()
915 t1->ack = !rst || !th->ack; in tcp_v6_send_response()
1019 const struct tcphdr *th = tcp_hdr(skb); in tcp_v6_send_reset() local
1039 if (th->rst) in tcp_v6_send_reset()
1050 if (tcp_parse_auth_options(th, &md5_hash_location, &aoh)) in tcp_v6_send_reset()
1078 sk1 = inet6_lookup_listener(net, NULL, 0, &ipv6h->saddr, th->source, in tcp_v6_send_reset()
1079 &ipv6h->daddr, ntohs(th->source), in tcp_v6_send_reset()
1100 if (th->ack) in tcp_v6_send_reset()
1101 seq = ntohl(th->ack_seq); in tcp_v6_send_reset()
1103 ack_seq = ntohl(th->seq) + th->syn + th->fin + skb->len - in tcp_v6_send_reset()
1104 (th->doff << 2); in tcp_v6_send_reset()
1304 const struct tcphdr *th = tcp_hdr(skb); local
1306 if (!th->syn)
1313 struct tcphdr *th, u32 *cookie) argument
1318 &tcp_request_sock_ipv6_ops, sk, th);
1320 *cookie = __cookie_v6_init_sequence(iph, th, &mss);
1704 4. Finally, it really contains options, which user wants to receive.
1732 const struct tcphdr *th) argument
1743 TCP_SKB_CB(skb)->seq = ntohl(th->seq);
1744 TCP_SKB_CB(skb)->end_seq = (TCP_SKB_CB(skb)->seq + th->syn + th->fin +
1745 skb->len - th->doff*4);
1746 TCP_SKB_CB(skb)->ack_seq = ntohl(th->ack_seq);
1747 TCP_SKB_CB(skb)->tcp_flags = tcp_flags_ntohs(th);
1761 const struct tcphdr *th; local
1780 th = (const struct tcphdr *)skb->data;
1782 if (unlikely(th->doff < sizeof(struct tcphdr) / 4)) {
1786 if (!pskb_may_pull(skb, th->doff*4))
1792 th = (const struct tcphdr *)skb->data;
1796 sk = __inet6_lookup_skb(skb, __tcp_hdrlen(th),
1797 th->source, th->dest, inet6_iif(skb), sdif,
1842 th = (const struct tcphdr *)skb->data;
1844 tcp_v6_fill_cb(skb, hdr, th);
1905 th = (const struct tcphdr *)skb->data;
1907 tcp_v6_fill_cb(skb, hdr, th);
1938 tcp_v6_fill_cb(skb, hdr, th);
1969 tcp_v6_fill_cb(skb, hdr, th);
1976 tw_status = tcp_timewait_state_process(inet_twsk(sk), skb, th, &isn,
1983 sk2 = inet6_lookup_listener(net, skb, __tcp_hdrlen(th),
1984 &ipv6_hdr(skb)->saddr, th->source,
1986 ntohs(th->dest),
2023 const struct tcphdr *th; local
2033 th = tcp_hdr(skb);
2035 if (th->doff < sizeof(struct tcphdr) / 4)
2039 sk = __inet6_lookup_established(net, &hdr->saddr, th->source,
2040 &hdr->daddr, ntohs(th->dest),
2166 "%4d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "
2213 timer_active = 4;
2234 "%4d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "
2274 "%4d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "